Battery Power - Spring 2015 - (Page 10)
Preventing Counterfeiting: Challenges and Selection Criteria
For an Ideal Authentication Solution
Infineon Technologies North America Corp.
The counterfeiting and cloning of devices and peripherals are major concerns for original equipment
manufacturers (OEMs). These concerns grow when manufacturing is outsourced to offshore Contract
Manufacturers (CMs) or even to multiple CMs, which can make it almost impossible to protect the intellectual property (IP) and prevent the unauthorized production of gray market products and peripherals.
Legitimate suppliers not only suffer direct revenue losses, but also lose brand reputation if a product is
damaged as the result of using cloned peripherals, and may even incur high liability costs.
Another problem OEMs face is that many new products are subsidized when introduced to the market,
with the intent of profiting on sustained after-market sale of accessories and add-ons to recover the
initial investment. This business model is often followed with such products as accessories for game
consoles, mobile devices and printer cartridges. Cloning poses a serious threat to this business model;
unauthorized accessories can even create a hazard risk to the end-users that increase the potential liability costs and damage OEMs' brand reputation. Tamper- and counterfeit-resistant peripherals not
only protect OEMs' brand image and liability, but also protect consumers by assuring the integrity of the
entire system and creating the intended user experience.
There are many classes of after-market parts and accessories that are built to be compatible with OEM
specifications and standards (notebook AC adapters and batteries). Often there are both legitimate accessories manufactured by authorized third parties, and unauthorized counterfeit/clone devices that
appear to be legitimate products but may not meet the operating or safety specifications of the OEMs.
Authentication deals with how the system identify authorized parts from unauthorized ones. Authentication of accessories covers all aspects of brand protection such as safety, reliability, quality, profit, performance and liability. It is increasingly important in light of current technology trends, such as high-energy
density batteries, different voltage levels in the same form-factor batteries, fast charging and the ability
of one single adapter to charge multiple types of mobile devices.
Why Hardware Authentication?
There are many tactics available to manufacturers to address anti-cloning issues. While in many cases
some degree of success is achieved, it is often short lived. Patents, custom connectors and proprietary
hardware/software solutions are used
to thwart attackers, cloners and hackers with variable success rates. It is
always a challenge to make both the
platform and its accessories tamperresistant. A relatively new approach is
the use of embedded authentication
hardware to ensure an accessory or
peripheral is authorized for use with a
given system. This can provide a high
degree of security for counterfeit prevention compared to the alternatives.
With different approaches available to
the OEMs, it is important to understand
the underlying technology to choose
the right authentication solution for a
Figure 1. Cryptographic Algorithms Used in Hardware
Battery Power * Spring 2015
Table of Contents for the Digital Edition of Battery Power - Spring 2015
Battery Power - Spring 2015
Batteries: An Integrated Solution
Preventing Counterfeiting: Challenges and Selection Criteria for An Ideal Authentication Solution
Extending Battery Life
Batter Management with an Intelligent Battery Sensor is Vital to The Success of Future Automotive Designs
ICs & Semiconductors
Testing & Monitoring
Conference Preview: Critical Power 2015
Research & Development
Calendar of Events
Battery Power - Spring 2015