Use Cases

  • Ecosystem Control Through asymmetric authentication / PKI
  • Disposables and Accessory Authentication
  • Disposable applications with limited use through programmable usage counter
  • Symmetric Authentication through use of an HMAC Key