|The NVM Insider, Issue 13|
|Page 2 - Executive Opinion|
|Page 4 - Tech Tidbits|
|Page 5 - Sidense Out and About|
Dear Customers, Partners and Suppliers,
During the past few weeks there has been a lot of confusing information regarding the Kilopass versus Sidense lawsuit. We would like to share our progress by pointing to certain facts that may help you understand the case better. Sidense believes it is winning its dispute with Kilopass, both in the Court and at the USPTO.
There isn't a day that goes by where we do not see a report about another mobile phone or other consumer electronics device being successfully hacked for nefarious purposes. The popularity of Apple's iPhone and phones based on Google's Android OS has made these devices an inviting target for credit card thieves, warez purveyors and even corporate spies. Our industry has responded with a layered defense consisting of both hardware and software. But new technology is enabling security schemes to be implemented at the system-on chip (SoC) interconnect level.
At the most base level, security starts when the phone or other electronic device is booted or turned on. One standard booting procedure used in most phones is called a "two stage" boot process. In this boot process, there is a first stage where the device boots by sending boot information from an internal read-only memory (ROM), non-volatile memory (NVM) or one-time programmable (OTP) memory to an internal static RAM (SRAM). This internal RAM is too small to hold all the required boot code, so its job is to cross load a larger set of boot code in a second stage. It is this second stage boot process that starts the device's operating system.
Analog ICs, sensors and mixed-signal SoCs that include analog circuitry need to meet precise specifications for analog signal behavior. To compensate for variations in chip processing and the effects of packaging, analog circuitry needs to be trimmed by adjusting part of the circuitry. Many devices such as silicon clocks, RFID chips and other devices used in applications such as mobile handsets also have very demanding requirements for low power consumption to maximize battery life or to operate within a very limited power budget.
Find our IP catalog on ChipEstimate.com.