AT97SC3204T-X1A180 Atmel, AT97SC3204T-X1A180 Datasheet - Page 2

no-image

AT97SC3204T-X1A180

Manufacturer Part Number
AT97SC3204T-X1A180
Description
CRYPTO TPM V1.2 TWI 28TSSOP
Manufacturer
Atmel
Series
CryptoController™r

Specifications of AT97SC3204T-X1A180

Applications
Secure Communications
Core Processor
AVR
Program Memory Type
EEPROM
Ram Size
*
Interface
TWI
Number Of I /o
*
Voltage - Supply
3 V ~ 3.6 V
Operating Temperature
0°C ~ 70°C
Mounting Type
Surface Mount
Package / Case
28-TSSOP
Processor Series
AT97x
Core
AVR8
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Controller Series
-
Lead Free Status / Rohs Status
 Details

Available stocks

Company
Part Number
Manufacturer
Quantity
Price
Part Number:
AT97SC3204T-X1A180
Manufacturer:
NORTEL
Quantity:
210
02
Applications
n
n
n
n
n
n
Markets
n
n
n
n
n
n
n
n
n
Atmel
family consists of both client and host hardware security ICs, which provide authentication, encryption, and secure data
storage capabilities (figure 1).
Why hardware security? Confidential data or secrets stored by unsecured means, such as in standard memories, are
vulnerable to attack and exposure. Hardware security ICs include many sophisticated design features specifically aimed
at keeping confidential data and core secrets safe from hackers, thereby protecting corporate revenue, protecting
valuable intellectual property, and limiting potential liability exposure.
System security is only as strong as the weakest link. This well known phrase should remain in the forefront of any system
developers mind as they conceptualize a secure system design. Many systems today are deployed with a hardware
security solution on the client side, while the host-side secrets are stored in unsecured memories. For those who
recognize this host-side implementation as a potential weakness, Atmel offers host-side hardware security companion
ICs specifically designed to eliminate this weakness (figure 2). Crypto Products host companion ICs implement the host
algorithm in hardware and securely store and manage the host secrets, thereby strengthening the system-level security
and reducing development time.
The Crypto Products family is ideally suited for a variety of applications, and in some cases more than one product in
the family can provide a solution for a given application. For example, if an application requires both authentication and
secure memory storage in a wired environment, CryptoMemory
desired, CryptoRF
bit key size is preferred, CryptoAuthentication
required, CryptoController
CRYPTO PRODUCTS PORTFOLIO
Authentication
IP protection
System integrity
Secure communication
Physical, network, & computer
access control
Secure key exchange
Metering
GPS
Printers
Set top boxes
Portable media players
Anti-cloning of consumables
PDA/Cell phones
Medical devices
E-Purse
n
n
n
n
n
n
n
Crypto Products Overview
Encrypted software downloads
Software & media anti-piracy
Firmware copy prevention
Filters
Cartridges
Chemical reagents
Batteries
®
’s Crypto Products portfolio offers full system security solution options for a wide variety of applications. The
®
, along with the supporting Reader IC, is an excellent choice. In cases where the strength of a 256
TM
(TPM) is a great choice. Application and market possibilities for Crypto Products include:
TM
Figure 1
Figure 2
is the answer. Lastly, when a high security standards-based solution is
Microprocessor
Microprocessor
Algorithm
Host Hardware
Keys
Security IC
®
may be the best solution. If a contact-less interface is
Host
Host
Algorithm
Keys
RFID Reader
RFID Reader
IC
IC
Client Hardware
Security IC
Client Hardware
Client
Security IC
Client

Related parts for AT97SC3204T-X1A180