Use Cases
- Ecosystem Control Through asymmetric authentication / PKI
- Disposables and Accessory Authentication
- Disposable applications with limited use through programmable usage counter
- Symmetric Authentication through use of an HMAC Key
The online versions of the documents are provided as a courtesy. Verify all content and data in the device’s PDF documentation found on the device product page.