NEC Electronics has introduced a new software for microcontrollers that detects counterfeit battery products in mobile phones and digital still camera batteries. By 2007, most after-market battery manufacturers will be out of the loop, and hopefully we won’t have to worry about exploding cellphones.
Mobile phones and digital cameras have surged in popularity in recent years, counterfeit batteries for these products have also increased. However, non-original batteries often fail to meet manufacturers’ safety and quality standards, leading to product malfunctions and personal injury.
Conventional technologies to address this issue are cumbersome and expensive hardware, or inexpensive but ineffective software solutions. NEC Electronics’ software offers a highly effective and flexible solution that helps OEMs affordably reinforce the safety of their products.
The software includes NEC’s CIPHERUNICORN-S technology, which uses the same key for both encryption and decryption (referred to as a symmetric key cryptosystem). The software’s processing speed is 18 times faster yet it requires 80% less memory than previous technologies. These features greatly reduce hardware requirements, making it possible to provide high-speed verification using NEC Electronics’ 78K0/78K0S 8-bit microcontrollers.
The software also offers robust protection against cache attacks (a recent decryption method that measures minute changes in processing times when information stored in the cache memory is accessed) by utilizing the latest algorithms. In addition to being compatible with NEC Electronics’ 8-bit 78K0/78K0S microcontroller family, the software can also be configured for use with third party products by customer request, enabling flexible system design.
It will be introduced in Japanese digital cameras by year’s end and is expected to be used in 50 million units by 2007. The software is ideal for use in mobile phones and batteries, but NEC Electronics is also considering extending this technology to “smart” keys, printers and ink cartridges, as well as bundling the technology into hardware options.