Secure Memory → Simplifying data security for OEMs.

Datakey Secure Memory line provides a range of security features, from devices with pre-programmed, non-changeable serial numbers to those with on-board encryption, password-protected memory, mutual authentication and tamper protection circuits.

SlimLine Token Series

Our most popular form factor

  • Low-cost Board-mount Receptacles
  • IP-rated Panel-mount Receptacles
  • 2-wire (I2C) Interface
  • 1 Kb to 256 Kb Capacity

Key Series

Intuitive Insert-and-turn Operation

  • Redundant Contact System
  • High Cycle-life Receptacles
  • 2-wire (I2C) Interface
  • 1 Kb to 256 Kb Capacity

Plug Series

Mounts flush & locks in place

  • Positive Locking System
  • IP65 Receptacle
  • 2-wire (I2C) Interface
  • 1 Kb to 256 Kb Capacity

Unique Identifier Line

Each Unique Identifier memory device (IIT, IIK or IIP models) ships with a unique, 48-bit serial number.  We also offer OEMs the option of having their own unique OEM code.  Both the OEM code and serial number are non-changeable.  In addition to this read-only information, the devices contain 1.5 Kb of re-writeable non-volatile memory.

Crypto Memory Line

The CryptoMemory® keys and tokens utilise Atmel’s CryptoMemory ICs.  We offer CryptoMemory keys and tokens with memory capacities from 1 Kb to 256 Kb.  When connected to an authorised host, the device and host will mutually authenticate each other.  Only after this takes place can encrypted communications occur.

More Than Just a Serial Number

Datakey Unique Identifier memory keys and tokens do contain a serial number that is guaranteed to be unique, but that’s not what makes this product unique. It is the 1.5 Kb of re-writable, non-volatile memory that make these products a much more powerful credential than read-only devices like mag-stripe cards or RFID badges.

Here are a couple of example ways to use our Unique Identifier memory devices:

  • 2-Factor ID

    Use an IIT memory token as the credential.  The serial number identifies the user and is used to encrypt the data.  The encrypted data includes a PIN that the user must enter at the device.  You must possess the token and know the password to gain access.  With the PIN stored on the device, the embedded device does not need to be constantly updated as new users are added.

  • ID with Audit Trail

    Let’s say you make a vending machine, parking meter, ticket machine or any other electronically-controlled device that collects cash.  At some point, someone must collect that cash and hopefully transfer all of it to the proper facility.  You can use an IIT token to gain access to the money.  The microcontroller validates the ID, but then also records on the token the amount money removed.  When the deposit is made, the token is used to ensure the full amount is deposited.

Want to find out more?

We would love to hear from you…

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.