The presented battery authentication architectures meet the counterfeit battery challenges to protect OEM businesses and to promote end-user safety and satisfaction. Several authentication schemes currently are used to identify that a battery pack is intended for specific portable products. The most common is the form factor or physical connection.
The selection of the battery authentication scheme between the simple ID authentication and SHA-1/HMAC-based authentication depends on the security level needed and cost for the applications. The simple ID authentication is the least expensive and is good for cost-sensitive applications, but it is easy to replicate.
Battery authentication is performed using a single contact through the 1-Wire interface. Analog Devices’ battery identification ICs provide data storage and serial number identification for battery packs. Cyclic redundancy check (CRC) verification provides data integrity during communication.
Our battery authentication ICs employ hardware-based Secure Hash Algorithm-1 (SHA-1) token authentication. This allows for security without the added cost and complexity of a microprocessor-based system. Battery authentication is performed using a single contact through the 1-Wire interface.
When the host and the authentication device have completed the calculation, the host reads the authentication digest value from the authentication device. It then compares it to its own value. If the values match, the battery pack is authenticated.
To authenticate a battery pack, the host generates a 160-bit random challenge. The generated random challenge is transmitted to the authentication device, which uses the secret key along with the 160-bit random challenge from the host to calculate the authentication digest value.
The counterfeit battery will likely have reduced performance and could even be dangerous. The solution is to ensure your system only accepts authorized batteries using a secure authentication scheme. Make sure your next system and battery design includes an …