Blog Inquiry Contact Jobs
 

Secure Programming

Product.Nr.: 25005

product description

Secure Programming

Breakthrough, Multi-Layer IP Protection

Secure Programming is an optional feature that reduces the risk of intellectual property being pirated during the production process. Using breakthrough, proprietary technology, Softlog System’s Secure Programming protects against piracy at the manufacturing plant. Available with every programmer that we sell, Secure Programming introduces several layers of protection for your business-critical intellectual property.


Separation of Admin & User Functions
Secure Programming operates on two levels. The “Admin” level corresponds to the developer or owner of the software, while the “User” level corresponds to a contract manufacturer (CM) or other personnel authorized to program devices. Security-sensitive tasks are only performed at the Admin level. Using the Softlog GUI, the software owner initializes the programmer with a unique password, ID number and secure buffer prior to shipping it to the CM. The owner can update the programmer remotely by sending encrypted files to the CM.
 

Encrypted Environment File
At the outset of a programming run, the owner creates an environment file that includes hex data, configuration information, and an optional counter that limits the number of successfully programmed devices. Secure Programming encrypts the environment file using strong encryption algorithms. This file can only be decoded by a programmer that has been initialized with the correct password and ID number.

Anti-Spoofing Counter
An optional counter, stored in non-volatile memory of the programmer, ensures that the number of programmed devices does not exceed a pre-defined value. This limits the number of devices that can be programmed from a particular environment file, thus preventing gray/black marketing of “spoofed” products.

Key Features

  • "Invisible" secure buffer up to 64 bytes in ICP2 protected memory
  • Configurable destination of secure buffer (Flash memory or EEPROM)
  • Configurable destination address and size of the secure buffer
  • Remote update

Download Information