UHF RFID tag IC with cryptographic authentication and -15 dBm sensitivity
The chip is intended for use in passive UHF transponder applications.
- SMIC
- 180nm
- G
- Silicon Proven
Root of Trust IP cores are foundational security building blocks used in modern SoC and ASIC designs to establish a trusted execution environment and ensure system integrity from the earliest stages of operation.
A hardware root of trust provides secure functions such as secure boot, cryptographic key storage, device authentication, and firmware verification, protecting systems against unauthorized access and tampering.
This catalog allows you to compare root of trust IP cores from leading vendors based on security features, certification support, performance, and integration capabilities.
Whether you are designing for automotive, IoT, mobile devices, or data center infrastructure, you can identify the right security IP to protect your system.
UHF RFID tag IC with cryptographic authentication and -15 dBm sensitivity
The chip is intended for use in passive UHF transponder applications.