By Martin Klimke and Chris Shire, Infineon Technologies To fight global warming and lower the dependency of fossil energy resource, smart grids will be deployed. Smart grids will transform the power grids into intelligent networks that need a solid security foundation. The article gives an overview on the role of security controllers in smart grids.…
Category: Technical Articles
Finally: make use of your Trusted Platform Module
By Sven Gossel, charismathics While smart card use seems a widely accepted method to authenticate the user to the secured environment of the enterprise, people are questioning the sense of the Trusted Platform Module built onto PC motherboards. Companies bought it with practically any of the computers in use today, but hardly make use of…
Biometrics for use in identification
By Emmanuel Ventadour, Gemalto Biometric technology can be found more and more in a large variety of ID applications, ranging from national ID documents, to travel documents and electronic healthcare cards. This article aims to give a short overview of the benefits of biometrics as well as provide some appropriate case studies. The fight against…
Electronic Vehicle Registration Card (eVRC)
By Carsten Müller und Birte Bräutigam, Giesecke & Devrient Since January 15, 2005, the eVRC (electronic vehicle registration card) has been a valid option for member countries of the EU. Requirements placed on the card body and the electronics as well as the outlook for the future are presented below. Introduction of the eVRC Owing…
Full speed ahead for infosecurity on the road
By Detlef Houdeau, Infineon Technologies Automotive security applications have been around for over 25 years. Parallel to the growth of electronic control systems, electronic security applications have been developed to protect vehicle and driver from misuse, theft as well as cyber attacks. Anti-theft electronics were included in the BMW 7 series in 1982 and a…
The Technical Progress of Hardware Security
by Marcus Janke and Dr. Peter Laackmann, Infineon Technologies AG Introduction Security processors are vastly utilized for protected processing and storage of data in many of today’s applications. Nevertheless, each security architecture automatically implies a preferred range of use and security lifetime. Consequently, selecting a product with the right security level is not a trivial…