inner-banner-bg

Journal of Mathematical Techniques and Computational Mathematics(JMTCM)

ISSN: 2834-7706 | DOI: 10.33140/JMTCM

Impact Factor: 1.3

Security Building into I-Button

Abstract

M. Venu gopal, E.G. Rajan

Recent developments in VLSI design using nano devices and the relevant state of the art methodologies have made latest smarter systems available for critical use. Such smart devices could be found in the general market for use with systems pertaining to telecommunications, image processing, mechatronics and so on. One of the security authentication methods used for smart device applications is I-button technology. I-button consists of a memory chip which is enclosed in a stainless steel can of 16 mm thickness. This can is attached to a key fob and a ring. I-button could be used not only for access control applications like computer usage and building entry but also be used as a support device for asset management and data-logging. Every I-button has a unique device address embedded in chip itself meaning all I- buttons come with their already designated addresses. Since I- buttons are fabricated with their stored unique chip addresses, and also user information is stored in EEPROM for user authentication, one can enhance communication security to second level [1]

PDF