Overview
eMemory's NeoBit OTP (One-Time Programmable) IP can be implemented seamlessly in various CMOS technologies such as logic, mixed-mode, analog, Radio-Frequency(RF) and high voltage(HV) processes without additional mask or wafer change. Process simplicity and flexibility not only make NeoBit extremely robust with high fabrication yield, additional advantages such as fast time-to-market, low manufacturing/ development cost and high scalability help NeoBit technology adopters strengthen the competitiveness of their products. eMemory provides IPs with densities from 8 bits to 64k Bytes in CMOS technologies from 0.7 um to 645 nm. To offer the greatest accessibility and flexibility, eMemory has licensed most foundries for NeoBit IP integration and fabrication.
Learn more about eFuse / OTP IP core
While leading foundries keep pushing Moore’s law to the limit of physics, embedded non-volatile memory (eNVM) is becoming a game-changer in designing advanced integrated chips.
In the applications of high-performance computing and high-end smartphones, chip designers are chasing high-profit margins, and customers are looking for products with the best performance and security. These demands create a powerful driving force, pushing foundries to keep up with Moore’s Law and IP vendors to keep providing high-performance IPs
The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.
A sensor is a device that detects a change in a stimulus and converts it into an electronic signal that can be measured or recorded. The stimulus can be many things, including a physical property, environmental parameter, chemical composition or a location, to name just a few. All sensing elements have nonlinearities that include an intrinsic nonlinearity over sensing range along with offset and sensitivity nonlinearity variations over temperature.
With the invention of Physical Unclonable Functions (PUF), we can now create a unique, inborn, unclonable key at the hardware level. The natural follow-up question to this is, “but how do we protect this key?” It is like storing your key to secrets in a drawer, a surefire way to break the secure boundary and create vulnerabilities.
The market for piracy is huge and hackers have become increasingly sophisticated even when security is implemented in hardware. The race between the aggressors and protectors is a battle without end. Smart connected home devices are increasingly storing and processing very sensitive and private user data in addition to attempting to deliver copyright protected content from service providers. Protecting consumer data is vital.