Products for Battery & Peripheral Authentication

Original design manufacturers specify products to achieve required performance and safety goals. Battery authentication ensures that connected devices fulfill the established requirements and are safe for the consumer. TI’s battery authentication devices use three levels of security, identification number, CRC algorithm and SHA-1 encryption.

Use the parametric search to find battery authentication parts, download datasheets and application notes, and order samples or evaluation modules.

Technical Documents   

  • Is your system secure? Protect it with TI's Battery Authentication porfolio. (slyt408.PDF, 582 KB)
    09 Jun 2011 Download
Loading...