industry news
Subscribe Now

Adesto Introduces Ultra Low Power EEPROM Memory Family Designed for Better IoT Security

SANTA CLARA, Calif., Dec. 07, 2016 (GLOBE NEWSWIRE) — Adesto Technologies (NADAQ:IOTS), a leading provider of application-specific, ultra-low power non-volatile memory products, today announced a new family of ultra-low power, serial EEPROM memory for battery-operated and low-power electronics. The new Mavriq ‘DS’ (Digital Security) Series offers system designers low-power operation, excellent endurance and features to enable better security in IoT and other connected devices.

“Our leadership in resistive RAM (RRAM) technology once again is demonstrated by our new Mavriq DS Series. The latest addition to our CBRAM based products offers extended write endurance as well as ultra low power and security features targeting IoT applications,” said Narbeh Derhacobian, CEO of Adesto.

Ultra-Low Energy Consumption, High Endurance

The Mavriq DS Series performs read and write operations with 4x less power than competitive solutions, and, in ultra-deep power down mode, uses as much as 50x less power. DS devices can automatically enter the ultra-deep power down mode following write operations, reducing controller operations and overall system energy. The new products also provide users over 100,000 write cycle endurance across the full temperature and voltage range. Unlike EEPROMs based on floating gate technology, Adesto’s EEPROM products do not derate endurance across their temperature and voltage ranges or when using byte write operation (see http://www.adestotech.com/endurance for comparison note).

The Mavriq DS family is built on Adesto’s revolutionary RRAM technology, known as Conductive Bridging RAM (CBRAM®) – a breakthrough non-volatile memory technology that enables extremely low energy consumption. Adesto is the first company to successfully commercialize a resistive RAM technology, having shipped millions of production parts to customers seeking high-speed, low-energy non-volatile memory solutions including wireless communications and other IoT applications.  

Tamper Resistant Memory
Security features designed into Mavriq DS products help protect against data tampering, including two, 64 byte one-time programmable security registers. The two registers are located outside of the memory map, and for extra protection, can only be accessed through control codes. One of the registers is dedicated for user programming, while the other is pre-programmed by Adesto with a unique identification number. Together, the two registers allow for the use of one-time programmed serial numbers for authentication and provide an additional means for device traceability.

Availability

Samples of Adesto’s Mavriq DS products are available now. The family includes a range of four densities: 32Kbit, 64Kbit, 128Kbit, and 256Kbit devices.

About Adesto Technologies

Adesto Technologies (NASDAQ:IOTS) is a leading provider of application-specific, ultra-low power non-volatile memory products. The company has designed and built a portfolio of innovative products with intelligent features to conserve energy and enhance performance including Fusion Serial Flash, DataFlash® and products based on Conductive Bridging RAM (CBRAM®) technology. CBRAM® is a breakthrough technology platform that enables 100 times less energy consumption than today’s memory technologies without sacrificing speed and performance. Adesto is focused on delivering differentiated solutions and helping its customers usher in the era of the Internet of Things.

 

Leave a Reply

featured blogs
Apr 24, 2024
Learn about maskless electron beam lithography and see how Multibeam's industry-first e-beam semiconductor lithography system leverages Synopsys software.The post Synopsys and Multibeam Accelerate Innovation with First Production-Ready E-Beam Lithography System appeared fir...
Apr 24, 2024
Diversity, equity, and inclusion (DEI) are not just words but values that are exemplified through our culture at Cadence. In the DEI@Cadence blog series, you'll find a community where employees share their perspectives and experiences. By providing a glimpse of their personal...
Apr 18, 2024
Are you ready for a revolution in robotic technology (as opposed to a robotic revolution, of course)?...

featured video

How MediaTek Optimizes SI Design with Cadence Optimality Explorer and Clarity 3D Solver

Sponsored by Cadence Design Systems

In the era of 5G/6G communication, signal integrity (SI) design considerations are important in high-speed interface design. MediaTek’s design process usually relies on human intuition, but with Cadence’s Optimality Intelligent System Explorer and Clarity 3D Solver, they’ve increased design productivity by 75X. The Optimality Explorer’s AI technology not only improves productivity, but also provides helpful insights and answers.

Learn how MediaTek uses Cadence tools in SI design

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

Secure Authentication ICs for Disposable and Accessory Ecosystems
Sponsored by Mouser Electronics and Microchip
Secure authentication for disposable and accessory ecosystems is a critical element for many embedded systems today. In this episode of Chalk Talk, Amelia Dalton and Xavier Bignalet from Microchip discuss the benefits of Microchip’s Trust Platform design suite and how it can provide the security you need for your next embedded design. They investigate the value of symmetric authentication and asymmetric authentication and the roles that parasitic power and package size play in these kinds of designs.
Jul 21, 2023
31,914 views