Jump to main content
Protection from Cloning Using PIC32CM LSx MCUs
Search
Home
4
Two Methods of Protection
Introduction
1
The Necessity of Protection
2
Clone Protection Using the PIC32CM LSx MCUs
3
Use Case: Printers and Cartridges
4
Two Methods of Protection
4.1
Using TrustZone
4.2
Using the ATECC608B Secure Element
5
Conclusion
6
References
7
Revision History
Microchip Information
4 Two Methods of Protection