In the past few years, I have used encryption chips many times. At that time, the understanding of encryption chips was to use a single-chip microcomputer chip, put the same key at both ends, and then define a communication protocol. The two sides exchange data through the protocol. If the data is what you want, the encryption is considered successful, otherwise it fails and stops working. After getting involved in the encryption chip industry, I found that the above encryption method can also be applied, but this method is easier to crack and it is also easier to skip the encryption chip. This is an authentication encryption chip that uses a random variable exchange system. It communicates with the system MCU in a cryptographic manner, and the MCU detects the ALPU encryption chip in key occasions such as system startup. So even if the pirated system copies the PCB, kernel, or even the firmware in the memory, the system will still not work if this custom encryption chip is missing. Advantages of customized encryption chips 1: Enterprises focusing on encryption chips Neowine has been committed to the research and development and production of encryption ICs since 2004. It currently has more than 10 encryption chips, and new products are launched every year to provide customers with safer and more superior products. 2: Customized encryption chips We provide each customer with a unique encryption chip. At the same time, we provide encryption library files that are unique to this chip according to the different platforms of the customers, and the software and hardware correspond one to one. 3: Secure advanced encryption algorithm The AES-128 algorithm is the standard algorithm adopted by the US federal government and is currently the most secure algorithm. We independently developed our own encryption algorithm based on the AES-128 encryption algorithm and obtained patent certification. 4: Secure protection mechanism Based on a secure encryption algorithm, the software and hardware work in matching order, and contain random pseudo-data communication encryption, which effectively prevents skipping inspection and makes the protection mechanism safer. 5: Simple usage According to the customer platform and environment, the encryption library file corresponding to the chip is provided. The customer only needs to use the main program to call the encryption interface function to communicate with the encryption chip. 6: Advanced production technology The encryption chip is designed according to ASIC, and the chip is composed of dozens of layers of logic circuits, so the hardware is almost impossible to crack. In addition, the chip silk screen only has the production cycle, no product model information, will not expose the information of the encryption chip, and can also customize the LOGO according to customer requirements. 7: Perfect customer management system Manage customer information filing, keep customer information absolutely confidential, and guarantee the interests of customers. After the customer confirms the use of the encryption chip, a confidentiality agreement will be signed. The contract contains customer information protection clauses, as well as exclusive use rights and purchasing rights clauses. 8: Intellectual property protection Effectively protect solutions and firmware to improve product competitiveness. OEM control effectively prevents illegal products. Charge license fees, increase sales, and increase production. 9: Professional service system Provide free test samples, all-round professional technical support and after-sales service. 10: Wide application Consumer electronics, industrial control, automotive electronics, printing consumables, game industry, smart products and other equipment. And in terms of remote authentication, it has been successfully applied to Wifi/Bluetooth and other equipment. Product features: 1: Based on AES international advanced algorithm. 2: ASIC logic circuit design, no burning, simple operation. 3: The first customized encryption IC, the only customer model, one-to-one correspondence between software and hardware. 4: OTP space for users. 5: With encryption and decryption function to prevent skipping verification. 6: Communication data encryption to prevent detection simulation. 7:IIC communication interface, SOT23-6 package. 8: Power supply voltage: 1.8V-3.6V wide voltage. 9: Built-in crystal oscillator, no external crystal oscillator circuit required.