Tuesday, December 26, 2017

Beating the counterfeiters

In the sandbox we use the same principle used for paper.  We make the cost of reverse engineering and reproduction significant, such that out of band industrial activity is noticeable.  Then we know that ultimately enough search locates the counterfeit source.

In secure cash card, we have a parameter called cash limit for typical consumers. This limits the transaction size and makes counterfeit flows difficult to conceal. The reverse engineering process requires high cost silicon wafer readers which have to sort through the maze of key masking inserted to defeat, an expensive industrial activity

But the best part of protection is the verification request, back to the foundry.   Every network keeps a constant address to reach the chip foundries which can verify a local processor.  The foundries expect a reasonable flow of verification requests, likely to match the use of the wellets.  They will notice, right away, when their expectations are wrong.  This leads to the active cyber patrol.  The occasional reading of the trade books looking for flows not really cyber verified all that much. 

The cyber cops make our secure cards do their security duty. Remember the foundries, themselves,ultimately insure against counterfeit.

No comments: