English
Language : 

AT98SC008CT Datasheet, PDF (1/18 Pages) ATMEL Corporation – High-tech goods counterfeiting
Secure Your Embedded Devices
1. Introduction
High-tech goods counterfeiting, multimedia content copying,
and identity theft are all major concerns today. The proven
cryptographic protocols implemented in Atmel’s tamper-resis-
tant microcontrollers offer a powerful turnkey solution to fight
these threats. This paper presents examples of efficient and
cost effective IP protection applications utilizing secure chips
in various embedded systems.
1.1. High-tech Goods Counterfeiting
According to the 2005 report [KMPG05] by accounting firm
KPMG® International, fake high-tech goods (cell phones,
computers, printer cartridges, etc.) account for about $100
billion in sales lost to counterfeiters each year. This means
that around 10 percent of all high-tech goods sold each year
worldwide are fakes! Therefore, 10 percent of all high-tech
sales are lost to the Intellectual Property (IP) owners.
Besides financial considerations, counterfeiting presents
noticeable collateral risks for the consumers – no guarantee
that faulty goods will be replaced and fake goods may even
injure the customer due to improper testing, poor quality of
consumables, etc. Counterfeit goods can also severely
degrade the public image of companies by deteriorating cus-
tomer satisfaction not to mention that fake automotive or
aeronautic spares present a real concern for public health
and safety.
Examples of the counterfeiting of high-tech goods are given
in [MERC]. Some renowned companies have been targeted
by international criminal organizations, which have sold thou-
sands of counterfeit-branded products in several countries.
Generally speaking, famous brand-name products are more
exposed to counterfeiting because they are seen as “must
have” goods and therefore are easier to sell on the counter-
feit market. Many accessories and peripherals (for mobile
phones, personal digital assistants, portable MP3 and video
players) are the target of criminals that use increasingly
sophisticated manufacturing means and industrial production
techniques.
Any high-tech product, whatever the market (mass marketed
items such as music players or even industrial equipment,
machines, etc.) is vulnerable to counterfeiters who aim at
Secure
Microcontrollers
Application Note
Rev. 6528A–17 May 06
1