当前位置:网站首页>Recommended scheme of national manufactured electronic components
Recommended scheme of national manufactured electronic components
2022-04-23 04:38:00 【leiditech】
Program Overview :
The fingerprint Key Take control of MCU At the core , The memory stores fingerprint digital template and authentication information . The fingerprint collector collects fingerprints and sends them to MCU, USB For controller Thousand connection PC End and MCU Communication for , Perform verification and comparison operations , All operations need a unified timing control . Secure authentication encryption IC Use thousands to ensure user trust The safety of interest .
Hot spots in the industry :
At present, network identity authentication methods are divided into single factor authentication / Two factor authentication / Multifactor authentication , The more factors, the higher the safety . The most typical way of multi factor authentication is certificate +us bke y, And fingerprints ke y+ Certificate is the most secure and reliable multi factor authentication
A convenient , Therefore, it has become the most perfect way to solve identity authentication . among Adopt financial grade security chip , It can resist various physical attacks .
Core devices :
As shown in the figure above, the of the aircraft core ACH51 2- LQFP100 It is a high-performance based on security algorithm SoC chip .
1. It is mainly used in thousands of eMMC/ SD/ Na ndf l a s h Mass storage devices 、 encryption U disc 、 Fingerprint recognition and other markets .
2. The chip uses 32 Bit kernel , A variety of security password modules are integrated in the chip , Include SMl 、SM2、SM3、SM4、SSF33 count Law ,
as well as RSA/ ECC、 ECDSA、DES/ 3DES、AES128/ 192/ 256 、SHAl / 256/ 384/ 512 And other security algorithms .
3. The chip provides a variety of peripheral interfaces : USB2. 0、UART 、SDI O、 I S07816、I 2C、 SPI 、NFM, MI M See the specification on the product details page for others
Industry combing :
For fingerprints Key Recommended products
The fingerprint Key source : Use the core box
Note: The information on this document is subject to change without notice.
版权声明
本文为[leiditech]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230403229249.html
边栏推荐
- Key points of AWS eks deployment and differences between console and eksctl creation
- Use recyclerview to realize left-right side-by-side classification selection
- Improving 3D object detection with channel wise transformer
- A heavy sword without a blade is a great skill
- [echart] démarrer avec echart
- leetcode007--判断字符串中的括号是否匹配
- Opencv -- yoact case segmentation model reasoning
- [AI vision · quick review of robot papers today, issue 31] Fri, 15 APR 2022
- 520.检测大写字母
- Apache Bench(ab 压力测试工具)的安装与使用
猜你喜欢
HMS Core Discovery第14期回顾长文|纵享丝滑剪辑,释放视频创作力
229. Find mode II
Go reflection rule
AWS EKS 部署要点以及控制台与eksctl创建的差异
Brushless motor drive scheme based on Infineon MCU GTM module
[AI vision · quick review of today's sound acoustic papers, issue 2] Fri, 15 APR 2022
Opencv -- yoact case segmentation model reasoning
【Echart】echart 入门
【论文阅读】【3d目标检测】point transformer
程序员抱怨:1万2的工资我真的活不下去了,网友:我3千咋说
随机推荐
数据孤岛是什么?为什么2022年仍然存在数据孤岛?
记录一下盲注脚本
三十六计是什么
[AI vision · quick review of today's sound acoustic papers, issue 3] wed, 20 APR 2022
io.Platform.packageRoot; // ignore: deprecated_member_use
国外LEAD,联盟经理常见问答
VHDL语言实现32位二进制数转BCD码
协程与多进程的完美结合
383. Ransom letter
VHDL implementation of 32-bit binary to BCD code
为什么推荐你学嵌入式
Summary of Android development posts I interviewed in those years (attached test questions + answer analysis)
383. 赎金信
IDE Idea 自动编译 与 On Upate Action 、 On Frame Deactivation 的配置
The perfect combination of collaborative process and multi process
Go反射—Go语言圣经学习笔记
递归调用--排列的穷举
【论文阅读】【3d目标检测】point transformer
Go 语言中的 logger 和 zap 日志库
[paper reading] [3D target detection] point transformer