Secure NFC/RFID tag authenticator with energy harvesting protects sensitive data transfer between master and slave devices

Designers can now perform secure wireless data communication on their embedded systems without needing the host microcontroller, but by simply using a single MAX66242 DeepCover® Secure Authenticator from Maxim Integrated Products, Inc.

The MAX66242 secure authenticator is an advanced tag that combines a wireless NFC/RFID interface with an I²C interface. Designers can now collect vital system data from portable devices even when the main energy source on the master device is not functional. The I²C and wireless RFID/NFC interfaces make it highly flexible and scalable for a wide range of applications. The MAX66242 is especially useful for applications that require additional external functionality, but do not have the space to place a connector. Ideal applications include secure, wireless transfer of medical data or asset tracking.

The MAX66242 enables wireless, contactless data collection between a host and slave device. The integrated, proven SHA-256 cryptographic engine provides symmetric challenge-and-response authentication based on a secret key for data downloads. Needing no separate controller to write data, the MAX66242’s I²C interface port can operate as a master port or a slave port for secure data exchanges. The MAX66242 comes with multiple memory programmable options which let a user configure a secure master/slave system and set usage limits using the EEPROM emulation mode to create nonresettable counters. Designers can also use the MAX66242 to set up easy and intuitive WiFi® or Bluetooth® connections as a means to securely storing the pairing codes. It then provides security for access control, asset tracking, system alert/wakeup, and authentication of medical sensors for the secure transfer of personal data.

The MAX66242 does not require an external power source. Instead it integrates an energy harvesting capability that can be used to power surrounding ICs like a temp sensor, to which it is connected to via the I²C interface. Using this harvested energy, the MAX66242 provides the energy source to the slave device and gathers data from it. The energy harvesting feature also complements the existing power source in battery-powered devices, so it will extend overall battery life.

Key Advantages

  • Secure authentication: integrated SHA-256 die-level protection prevents cloning, counterfeiting, and data theft in applications that must have secure data transfer.
  • Dual interfaces: wired I²C and wireless RFID/NFC provide versatility for many applications.
  • Energy harvesting: supports two energy-harvested voltage output levels, 1.8V and 3.0V typical; harvests energy even on devices without a power source.
  • High integration: integrates SHA-256 bidirectional authentication with advanced security hardware; 32-byte SRAM buffer for fast I²C-to-RFID data transactions; dual interfaces eliminate the need for a separate controller.

Commentary

“The MAX66242 DeepCover Secure Authenticator enables secure, contactless data collection while eliminating the need to physically touch the device,” said Hamed Sanogo, executive business manager at Maxim Integrated. “The energy harvesting capability allows users to harvest power that would otherwise be wasted and collect data securely from any end equipment, even when the master system is not powered.”

Availability and Pricing

  • Specified over the -20-degree Celsius to +85-degree Celsius temperature range.
  • Pricing is available upon request.
RECENT ARTICLES

Aeris to acquire IoT business from Ericsson

Posted on: December 8, 2022

Ericsson and Aeris Communications, a provider of Internet of Things (IoT) solutions based in San Jose, California, have signed an agreement for the transfer of Ericsson’s IoT Accelerator and Connected Vehicle Cloud businesses.

Read more

Telenor IoT passes milestone of 20mn SIM cards

Posted on: December 8, 2022

Telenor, the global IoT provider and telecom operator, has experienced rapid growth over the last years and ranks among the top 3 IoT operators in Europe and among the top IoT operators in the world. The positive development is due to an accelerated pace of new customers combined with a successful growth of existing customers’

Read more
FEATURED IoT STORIES

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

Talking Heads: The M2M Doctor is in the House

Posted on: December 26, 2013

Mobile health is M2M at its most rewarding. So says, Dan MacDuffie CEO of Wyless (left). And he should know, his managed services company has achieved 50% yearon- year growth recently and a growing portion of that is in mHealth and Wellness services. He’s certain we’re standing on the threshold of a new generation of health services that cut delivery costs, extend the reach

Read more

Talking Heads: mHealth gains ground as one-stop shops and M2M with ‘wired safety net’ bring efficient patient monitoring

Posted on: December 23, 2013

For years analysts have touted mobile healthcare as a huge opportunity for those offering machine-to-machine communication (M2M) services. Truth be told, the progress so far has been patchy, at best. So M2M Now asked Alexander Bufalino, SEVP Global Marketing at Telit, to describe the hurdles in the way of M2M mHealth, how they are now being overcome and what

Read more

Unlocking the total value of M2M

Posted on: December 19, 2013

Do you ever wonder why people and organisations invest in machine-to-machine communications (M2M) and the Internet of Things (IoT), asks Fred Yentz? Reasons may differ somewhat across industry segments but in most cases they fall in one or more of three categories: To make money, to save money or to be compliant. ILS Technology is squarely focused on helping

Read more

Paving the way to the Internet of Things

Posted on: December 17, 2013

Combining the ARM computing engine with location-awareness and wireless connectivity It’s set to be the Perfect Storm: The rapid growth of high-speed cellular networks and the introduction of IP version 6 which has enough IP addresses for every grain of sand on Earth. Add to this mix the proliferation of the ARM embedded computing architecture, now the de facto global

Read more

What’s the ‘real deal’ on the Internet of Things?

Posted on: December 16, 2013

The ‘Internet of Things’ buzzword appears to have picked up steam during the past several months as large players such as GE and Cisco have touted their stories on the growing number of connected devices. But, as Alex Brisbourne of KORE asks, how different, if at all, is the Internet of Things when compared with other connected device markets,

Read more

M2M Now Magazine December 2013 Edition

Posted on: December 5, 2013

M2M Now magazine explores the evolving opportunities and challenges facing CSPs across this sector. Our exclusive interviews pass on some key lessons learned by those who have taken the first steps in next gen Machine to Machine (M2M) services. In the latest issue: TALKING HEADS: Alexander Bufalino of Telit tells how one-stop shops and M2M with a ‘wired

Read more