Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Maxim Integrated Shares Ways to Keep Smart Medical Devices Safe

With the backdrop of the COVID-19 global pandemic, healthcare professionals are seeing a rise in telehealth practices, as physical distancing guidelines are compelling doctors to conduct more patient visits by phone or online. Smart, connected medical devices are a useful tool in this climate. For example, wearables that provide continuous, real-time monitoring of vital signs can yield a treasure trove of health insights for patients and physicians alike. But, as with any IoT devices, smart medical devices—and the sensitive patient data they collect—can also be vulnerable to security threats if left unprotected.

To protect these sensitive healthcare devices from hackers and other threats, Maxim Integrated offers robust protection in the form of physically unclonable function, or PUF, technology.

Recommended AI News: Adfone And AT&T In Mexico, Introduce The Unepuntos Rewards Platform

A PUF is derived from the complex and variable physical and electrical properties of ICs. Since it depends on random physical factors introduced during the manufacturing process (and that are unpredictable as well as uncontrollable), PUF technology provides a number of advantages:

Related Posts
1 of 40,477
  • It is virtually impossible to duplicate or clone.
  • The digital fingerprint that PUF technology natively generates for its associated IC can be used as a unique secret key to support the algorithms that are used in authentication, identification, anti-counterfeiting, hardware-software binding, and encryption/decryption.
  • An effective PUF implementation should be inherently nonvolatile, requiring no battery or other permanent power source.
  • The circuitry should be resistant to physical inspection, and the key should be generated only when needed for a cryptographic operation.

Recommended AI News: 360Quadrants Releases Quadrant Of Best Project Management Software Vendors

Maxim Integrated’s version of PUF technology, called ChipDNA technology, is even more robust. A ChipDNA PUF circuit relies on the naturally occurring random analog characteristics of fundamental MOSFET devices to produce the cryptographic keys. It ensures that the unique binary value generated by each PUF circuit can be repeated over temperature and voltage and as the device ages. This unique value is never stored on the chip. This differs from many traditional security implementations, where secret keys are stored in nonvolatile memories like NOR/NAND flashes or on special external memory chips like battery-backed SRAMs. Instead, with ChipDNA PUF technology, the secret key is generated only when needed by the PUF circuit and disappears when it’s no longer needed. Also, if a hacker tries to conduct an invasive physical attack on a PUF-based device, the attack itself would change the electrical characteristics of the PUF circuit, further impeding the attack.

Recommended AI News: New Training Course Aims To Make It Easy To Get Started With EdgeX Foundry

Comments are closed, but trackbacks and pingbacks are open.