To safeguard the integrity of their batteries, OEMs require a battery security mechanism that produces a different data stream every time the host chal- lenges it, in order to defeat a counterfeiter's oscilloscope. This can be implemented today using standard ICs and proven security algorithms. The basic operation of such a challenge-and-respond scheme involves the generation of a random data stream by the host (see Figure 2). This random data stream is communicated to the battery, which then performs a transform function on the data stream using a secret key held by the battery and the host. The battery then sends back the transformed data stream to the host. Meanwhile, the host performs the same transform function on the random data. If the two values provided by the battery and the host match, the battery is authenticated and the host permits it to function normally.
展开▼