<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Files</title><link>https://community.element14.com/technologies/security/m/files</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><lastBuildDate>Thu, 19 Aug 2010 09:58:28 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://community.element14.com/technologies/security/m/files" /><item><title>Nová tvář bezpečnosti a sledování.pdf</title><link>https://community.element14.com/technologies/security/m/files/2698</link><pubDate>Thu, 19 Aug 2010 09:58:28 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:9aa884e5-78ac-419e-987a-4009d1c03363</guid><dc:creator>laskowska</dc:creator><slash:comments>0</slash:comments><description>&lt;span&gt;Nová tvář bezpečnosti a sledování – biometrická identifikace tváře&lt;/span&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2698/download" length="553411" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/farnell">farnell</category><category domain="https://community.element14.com/technologies/security/m/files/tags/cesky">cesky</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometric">biometric</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometrics">biometrics</category><category domain="https://community.element14.com/technologies/security/m/files/tags/camera">camera</category><category domain="https://community.element14.com/technologies/security/m/files/tags/farnell">farnell</category><category domain="https://community.element14.com/technologies/security/m/files/tags/cesky">cesky</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometric">biometric</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometrics">biometrics</category><category domain="https://community.element14.com/technologies/security/m/files/tags/camera">camera</category></item><item><title>A biztonság és a felügyelet új arca.pdf</title><link>https://community.element14.com/technologies/security/m/files/2691</link><pubDate>Wed, 18 Aug 2010 08:41:36 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:00beb68e-8c33-4df0-9933-1a1c78c85f1d</guid><dc:creator>Former Member</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;&lt;strong&gt;A biztonság és a felügyelet új arca&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;strong&gt;Biometrikus arcfelismerés&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;Ankur Tomar – Farnell Technical Support&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;A mai helyzetben különösen kényszerítő szükségszerűséggé vált a gyanúsan viselkedő személyek vagy&lt;br /&gt;a gyanús viselkedés felismerése olyan – biztonsági szempontból kiemelt fontosságú – helyeken, mint a repülőterek,&lt;br /&gt;vasútállomások, kormányzati vagy más középületek. Ez az oka annak, hogy ma már – egyebek közt – a videoalapú,&lt;br /&gt;biometriai azonosító és arcfelismerő rendszerek is világszerte a biztonsági fenyegetések kezelésének legfontosabb&lt;br /&gt;eszközei közé tartoznak.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2691/download" length="292104" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometric">biometric</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometrics">biometrics</category><category domain="https://community.element14.com/technologies/security/m/files/tags/hungary">hungary</category><category domain="https://community.element14.com/technologies/security/m/files/tags/magyar">magyar</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometric">biometric</category><category domain="https://community.element14.com/technologies/security/m/files/tags/biometrics">biometrics</category><category domain="https://community.element14.com/technologies/security/m/files/tags/hungary">hungary</category><category domain="https://community.element14.com/technologies/security/m/files/tags/magyar">magyar</category></item><item><title>IP-alapú videomegfi gyelő rendszerek.pdf</title><link>https://community.element14.com/technologies/security/m/files/2690</link><pubDate>Wed, 18 Aug 2010 08:39:39 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:ba2edb8b-4c41-4e9b-97b2-324bfc0fbcea</guid><dc:creator>Former Member</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;&lt;strong&gt;IP-alapú videomegfi gyelő rendszerek&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;br /&gt;Az internetalapú technológiák az adattovábbításon kívül egyre inkább használatosak valós idejű multimédiainformációk&lt;br /&gt;továbbítására is. A személyi- és vagyonbiztonságot egyre inkább veszélyeztető környezetben fokozódik&lt;br /&gt;az igény a könnyen telepíthető, nagy területen szétosztott, könnyen rendszerré integrálható eszközökből álló&lt;br /&gt;biztonsági videomegfi gyelő és eseményrögzítő rendszerek iránt. A cikk azt mutatja be, hogy az IP-technológia&lt;br /&gt;hogyan épül be a biztonságtechnikai eszközökbe.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2690/download" length="325277" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ip">ip</category><category domain="https://community.element14.com/technologies/security/m/files/tags/camera">camera</category><category domain="https://community.element14.com/technologies/security/m/files/tags/hungary">hungary</category><category domain="https://community.element14.com/technologies/security/m/files/tags/magyar">magyar</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ip">ip</category><category domain="https://community.element14.com/technologies/security/m/files/tags/camera">camera</category><category domain="https://community.element14.com/technologies/security/m/files/tags/hungary">hungary</category><category domain="https://community.element14.com/technologies/security/m/files/tags/magyar">magyar</category></item><item><title>Application Notes- Security System Control with the MAXQ2000</title><link>https://community.element14.com/technologies/security/m/files/2435</link><pubDate>Fri, 30 Oct 2009 16:03:29 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:738953a0-a47f-4015-b080-a5fe4e1c8647</guid><dc:creator>tech1</dc:creator><slash:comments>0</slash:comments><description>&lt;span&gt;Alarm control panels are a part of almost everyone&amp;#39;s daily life, either at home or at work. This article describes a sample alarm control application using the MAXQ2000 Low-Power LCD Microcontroller, created with the MAX-IDE development environment. The MAXQ2000 can be easily interfaced to peripherals typically used in security applications, including LCD displays, PIN entry keypads, piezoelectric horns and buzzers, and magnetic&lt;/span&gt;&lt;br /&gt;&lt;span&gt;reed switches.&lt;/span&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2435/download" length="128998" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>Application Note- Security in Embedded Systems- AN3824</title><link>https://community.element14.com/technologies/security/m/files/2444</link><pubDate>Fri, 30 Oct 2009 15:47:30 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:94ec83cb-e89e-44ff-b513-0a155ce898fb</guid><dc:creator>tech1</dc:creator><slash:comments>0</slash:comments><description>&lt;span&gt;Encryption alone is not enough to protect sensitive information. This application note describes why the key should be protected. The DS5250 is the best choice for this true tamper detection, providing the highest level of security for your embedded system.&lt;/span&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2444/download" length="37781" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>Application Notes- Protecting the R&amp;D Investment—Two-Way Authentication and Secure Soft-Feature Settings- AN3675</title><link>https://community.element14.com/technologies/security/m/files/2434</link><pubDate>Fri, 30 Oct 2009 15:44:35 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:264a607b-9a78-42d3-bbd9-60b69fed34bf</guid><dc:creator>tech1</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;In the age of identity theft and faked IDs, achieving positive identification is of paramount importance. This is not only true for individuals, but also applies to electronic products. System vendors need to protect their products against hacker attacks from the &amp;quot;outside&amp;quot; and ensure that the security is not compromised on the &amp;quot;inside&amp;quot; through cloned hardware. The key to realizing these diverging requirements is authentication.&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;This article explains the concept of authentication and specifically a Maxim solution in the form of secure memories to provide secure control and protection from application requirements including intellectual property protection, embedded HW/SW license management, secure soft-feature and status setting, and tamper-proof data storage.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2434/download" length="120843" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>Application Notes- Security System Control with the MAXQ2000- AN3546</title><link>https://community.element14.com/technologies/security/m/files/2433</link><pubDate>Fri, 30 Oct 2009 15:44:31 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:1ac17b52-eebd-48a2-b0e4-a0cd781444e1</guid><dc:creator>tech1</dc:creator><slash:comments>0</slash:comments><description>&lt;span&gt;Alarm control panels are a part of almost everyone&amp;#39;s daily life, either at home or at work. This article describes a sample alarm control application using the MAXQ2000 Low-Power LCD Microcontroller, created with the MAX-IDE development environment. The MAXQ2000 can be easily interfaced to peripherals typically used in security applications, including LCD displays, PIN entry keypads, piezoelectric horns and buzzers, and magnetic&lt;/span&gt;&lt;br /&gt;&lt;span&gt;reed switches.&lt;/span&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2433/download" length="128998" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security_3A00_se">in:security:se</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security_3A00_se">in:security:se</category></item><item><title>Application Notes- Are SHA-1 Devices Still Secure Enough?- AN3522</title><link>https://community.element14.com/technologies/security/m/files/2432</link><pubDate>Fri, 30 Oct 2009 15:39:55 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:710cd816-7ae3-4713-9e29-9e2e63eb3739</guid><dc:creator>tech1</dc:creator><slash:comments>0</slash:comments><description>&lt;span&gt;In 2005, a group of Chinese researchers attacked the strength of the Secure Hash Algorithm (SHA-1). This white paper discusses that attack and shows that, although the algorithm is slightly less collisionresistant than previously thought, the security of the SHA-1 memory devices from Maxim is not affected. Thus, the company&amp;#39;s SHA-1 memory devices (DS1963S, DS1961S, DS2460, DS28CN01, DS28E01-100 and DS2432), will continue to provide a low-cost, effective solution for accessory/peripheral authentication and tamper-proof, verifiable memory applications.&lt;/span&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2432/download" length="28231" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>Application Notes- Increasing System Security by Using the DS5250 as a Secure Coprocessor- AN3294</title><link>https://community.element14.com/technologies/security/m/files/2443</link><pubDate>Fri, 30 Oct 2009 15:37:09 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:f95d5426-c0d8-4eb3-9df5-45b9de335689</guid><dc:creator>tech1</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;This application note describes how to use the Dallas Semiconductor DS5250 High-Speed Secure Microprocessor as a secure coprocessor to protect passwords, PINs, encryption keys and other critical data.&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;br /&gt;The DS5250 employs triple-DES bus encryption, elaborate tamper sensors, and battery-backed SRAM to form a cryptographic boundary that shields valuable intellectual property. A user-configurable external tamper sensor allows the system architect to extend the DS5250&amp;#39;s security shield to include the application&amp;#39;s enclosure, protecting all of the system components if desired.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2443/download" length="47939" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>Application Notes- Requirements of Remote Keyless Entry (RKE) Systems- AN3395</title><link>https://community.element14.com/technologies/security/m/files/2431</link><pubDate>Fri, 30 Oct 2009 15:33:57 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:4bedae81-97e1-4aa9-8246-c16eb7cd4ae5</guid><dc:creator>tech1</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an after-market item. This application note provides an overview of RKE systems and discusses how they meet requirements such as range, battery life, reliability, cost, and regulatory compliance.&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;It shows some circuits and design approaches and offers some predictions for future systems, which will include&lt;/p&gt;&lt;p style="margin:0;"&gt;two-way communications.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2431/download" length="82303" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>AN2033 - Maxim - SRAM-Based Microcontroller Optimizes Security</title><link>https://community.element14.com/technologies/security/m/files/2419</link><pubDate>Fri, 30 Oct 2009 12:39:15 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:0e01766d-4e61-4d29-a091-f09bb33e89d6</guid><dc:creator>tech6</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;&lt;strong&gt;APPLICATION NOTE 2033&lt;/strong&gt; SRAM-Based Microcontroller Optimizes Security&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;br /&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;It is shown that nonvolatile (NV) SRAM is the most secure memory for storing secure data. By encrypting the memory with DES or triple DES, a cryptographic boundary can be erected that renders the secure information impervious to hackers. The volatile nature of the SRAM can be further protected by using tamper-reactive sensors that will erase the encryption keys as a response. Financial applications such as PINpads rely on the automatic program and data memory encryption features to secure data. The DS5250 is a high-performance, secure 8051 microcontroller that uses the unique properties of secure SRAM to protect sensitive data.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2419/download" length="108539" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_sram">ap:sram</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_sram">ap:sram</category></item><item><title>AN4029 - Maxim - The DS8007 and Smart Card Interface Fundamentals</title><link>https://community.element14.com/technologies/security/m/files/2418</link><pubDate>Fri, 30 Oct 2009 12:38:07 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:7d1cafc7-a2ae-4a71-8cb7-8a5585a4fd17</guid><dc:creator>tech6</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;&lt;strong&gt;APPLICATION NOTE 4029&lt;/strong&gt; The DS8007 and Smart Card Interface Fundamentals&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;The DS8007 is a multiprotocol, low-cost, dual, smart card interface that supports all ISO 7816, EMV[emoticon:7d377b609b6f44bf9290e3d8a0b9a733], and GSM11-11 requirements. This one mixed-signal peripheral manages all the details of the interface between a microcontroller and two, independent smart cards. This application note describes some of the fundamentals of smart cards and how to communicate with them. Software is provided that uses the DS8007 to interface a smart card with a DS5002 Secure Microprocessor.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2418/download" length="79180" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_smart_5F00_card">ap:smart_card</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_smart_5F00_card">ap:smart_card</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>AN3976 - Maxim - Embedded Security Going Forward</title><link>https://community.element14.com/technologies/security/m/files/2417</link><pubDate>Fri, 30 Oct 2009 12:37:23 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:aacc28f9-1be2-4feb-934b-8c1591f2e2bb</guid><dc:creator>tech6</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;&lt;strong&gt;APPLICATION NOTE 3976&lt;/strong&gt; Embedded Security Going Forward&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;Equipment manufacturers and designers are facing many new design challenges due to the continuing need for increased data security in many of today&amp;#39;s electronic systems. At the heart of the problem is the need to either implement security and antitamper countermeasures into a new application that never before required such mechanisms, or to avoid the introduction of new design variables into proven existing security circuitry. This is compounded with the emergence of new security standards and the the everincreasing demands the certification bodies require. The challenges of maintaining size and cost competitiveness further complicate this critical design requirement. In order to meet these challenges, Maxim has introduced a family of innovative devices designed to specifically address new and emerging security standards in a controlled and layered approach. The following describes how these new devices allow legacy designs to be enhanced with additional security, while minimizing the costs and risks of designing entirely new embedded security platforms.&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;br /&gt;This article was also featured in Maxim&amp;#39;s Engineering Journal, vol. 59 (PDF, 497kB).&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2417/download" length="38353" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_embedded_5F00_security">ap:embedded_security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_embedded_5F00_security">ap:embedded_security</category></item><item><title>AN4120 - Maxim - Using the DS8007 In Smart-Card Transactions</title><link>https://community.element14.com/technologies/security/m/files/2416</link><pubDate>Fri, 30 Oct 2009 12:36:15 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:9d1842f8-3198-4d88-bea0-bea88b99b66b</guid><dc:creator>tech6</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;&lt;strong&gt;APPLICATION NOTE 4120&lt;/strong&gt; Using the DS8007 In Smart-Card Transactions&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;This application note is an example of payment terminal transactions with smart cards using the DS8007 as the interface device and the&lt;br /&gt;DS5002 secure microcontroller. A DS8007 evaluation (EV) kit board and available C source code implement the basic smart-card credit, debit, and&lt;br /&gt;card initialization functions.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2416/download" length="89081" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_smart_5F00_card">ap:smart_card</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_smart_5F00_card">ap:smart_card</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item><item><title>AN4167 - Maxim - Cookbook for Analog Video Filtering in Camera Systems</title><link>https://community.element14.com/technologies/security/m/files/2415</link><pubDate>Fri, 30 Oct 2009 12:35:25 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:e0467090-009f-437d-ba11-1d506c7cb1b4</guid><dc:creator>tech6</dc:creator><slash:comments>0</slash:comments><description>&lt;p style="margin:0;"&gt;&lt;strong&gt;APPLICATION NOTE 4167&lt;/strong&gt; Cookbook for Analog Video Filtering in Camera Systems&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;Analog video filtering is widely used at the output stage in video camera applications, such as CCTV, security camera, digital still cameras (DSCs), and digital video camcorders (DVCs). As products are reduced in size and power, designers are moving away from discrete solutions to more integrated, one-chip solutions. This article explains different filter amplifier configurations for several popular DACs in the video camera market. It is an easy-touse guide for Maxim&amp;#39;s various integrated video filter amplifiers that satisfy a wide range of video application requirements.&lt;/p&gt;</description><enclosure url="https://community.element14.com/technologies/security/m/files/2415/download" length="271759" type="application/pdf" /><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_analog_5F00_video">ap:analog_video</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category><category domain="https://community.element14.com/technologies/security/m/files/tags/sp_3A00_maxim">sp:maxim</category><category domain="https://community.element14.com/technologies/security/m/files/tags/at_3A00_applicationnote">at:applicationnote</category><category domain="https://community.element14.com/technologies/security/m/files/tags/ap_3A00_analog_5F00_video">ap:analog_video</category><category domain="https://community.element14.com/technologies/security/m/files/tags/in_3A00_security">in:security</category></item></channel></rss>