THE SAFE CHOICE FOR
INDUSTRIAL MEMORY AND DATA SECURITY

Be the first to see Datakey’s new Mini-Bar at Electronica, Munich in Hall 5, Booth C176!

Secure Memory → Simplifying data security for OEMs.

Datakey Secure Memory line provides a range of security features, from devices with pre-programmed, non-changeable serial numbers to those with on-board encryption, password-protected memory, mutual authentication and tamper protection circuits.

Our most popular form factor

Intuitive Insert-and-turn Operation

Mounts flush & locks in place

Unique Identifier Line

CryptoAuthentication™ memory tokens take the security features of Microchip’s ATSHA204A and ATECC608A ICs and put them into a physically robust portable memory device

Crypto Memory Line

The CryptoMemory® keys and tokens utilise Atmel’s CryptoMemory ICs.  We offer CryptoMemory keys and tokens with memory capacities from 1 Kb to 256 Kb.  When connected to an authorised host, the device and host will mutually authenticate each other.  Only after this takes place can encrypted communications occur.

More Than Just a Serial Number

Datakey Unique Identifier memory keys and tokens do contain a serial number that is guaranteed to be unique, but that’s not what makes this product unique. It is the 1.5 Kb of re-writable, non-volatile memory that make these products a much more powerful credential than read-only devices like mag-stripe cards or RFID badges.

Here are a couple of example ways to use our Unique Identifier memory devices:

2-Factor ID

Use an IIT memory token as the credential. The serial number identifies the user and is used to encrypt the data. The encrypted data includes a PIN that the user must enter at the device. You must possess the token and know the password to gain access. With the PIN stored on the device, the embedded device does not need to be constantly updated as new users are added.

ID with Audit Trail

Let’s say you make a vending machine, parking meter, ticket machine or any other electronically-controlled device that collects cash. At some point, someone must collect that cash and hopefully transfer all of it to the proper facility. You can use an IIT token to gain access to the money. The microcontroller validates the ID, but then also records on the token the amount money removed. When the deposit is made, the token is used to ensure the full amount is deposited.

Want to find out more?

We would love to hear from you…

FREE comparison guide – EEPROM Vs Flash Memory

Request for Brochure

"*" indicates required fields

Name*

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.