We currently live in strange times.
(Understatement of the century.)
Most of us have been cooped up at home for a long time now, which comes with both joys and challenges.
On one hand, I’m really enjoying spending more time just the four of us, as a family unit, well most of the time, anyway!
On the other, it isn’t half tiring having to be a managing director, and teaching assistant all at the same time (my wife Victoria is the main teacher – I just follow instructions!).
What the ‘lockdown’ has provided me though, is an opportunity to research and develop new opportunities – with more time sat at my desk at home, there’s some time to fill.
And if you’re in the same boat, with a little more time to think and plan for up and coming new embedded developments, I thought I’d take this time to remind you exactly what Datakey products are, as well as the particular applications that they’ve proven to be really helpful for.
First up, here are some of the typical applications where Datakey products really come into their own:
Data Logging: great solution for embedded data logging applications, especially in harsh environments due to vibration, shock or dust / dirt.
User Rights / Preferences: identify the user and store users preferred / allowed settings.
Parameter Uploads: reliable and consistent method to upload device parameters and calibration data.
Medical Disposable Authentication: protect against counterfeit devices by including key/token with consumable which can be validated by host unit.
Secure access to Unmanned Autonomous Vehicles: ensure only trained and cleared operatives can operate the controls for any type of UAV.
Usage Tracking / Limiting Use: tethered to a disposal medical product with a finite lifespan to control usage.
Feature enable/unlock: send out a feature activation token to your customer to unlock key features in your system.
Firmware updates: easy update of firmware
Positively Linking Wireless Devices: establish a positive link between two wireless devices in critical applications.
Crypto Ignition Key: securing data communications across many different platforms
Access Control: using Datakey keys/tokens as a credential
As you can imagine, there are many other ways the products are used, but hopefully this gives you a good idea of what they are, and the ways in which they can benefit your embedded system.
If you’d like to talk in more detail about any of these applications (or whether Datakey products would work in a different application), then just let me know.
Stay safe