Secure Computing

Systems that handle valuable data but lack high security access control need as much protection from malicious attacks as possible. End-point applications where third parties install or modify system components are the most likely opportunities for malicious activity. In these applications you need more than just secure communications, you need component verification, counterfeit protection and physical layer security. Embedded cryptographic algorithms can verify that system components are valid and genuine, and tamper detection ensures your data has not been compromised at the semiconductor level.

Our secure computing solutions help you easily protect, secure, and validate your entire computing infrastructure.


Mobile Financial Terminals

DeepCover® secure microcontrollers integrate advanced cryptography and physical security to offer the highest level of protection against side-channel attacks, physical tampering, and reverse engineering. Integrated secure NV SRAM is instantly erased when an intrusion is detected

DeepCover Secure Microcontrollers 

Mobile POS Video ›
Mobile POS Reference Design ›

Subsystem Authentication

Embedded electronic authentication ensures that sub-systems, accessories and attachments, used with or within a piece of equipment, are not counterfeit. By employing electronic authentication a manufacturer can more fully control the usage and performance of their products. Depending on the application, electronic authentication helps to maintain product reliability, accuracy, safety, and security and can also protect profit margins.

Authentication Applications ›
Secure Authenticators ›
Security Managers ›

Featured Products

DeepCover Secure Microcontroller with ARM926EJ-S Processor Core


High-performance, single-chip secure microcontroller with encrypted external bus and advanced physical security.

DeepCover Secure Cortex-M3 Flash Microcontroller


Secure Cortex-M3 Flash Microcontroller with Secure Boot Loader with PKA

DeepCover Secure Microcontroller with Fast Wipe Technology and Cryptography


High-security microcontroller for single-chip PCI-PTS smart PIN pads.


The following block diagrams show where Maxim products fit into mobile financial terminals. Click on a block within a diagram to view recommended ICs.

Mobile Point-Of-Sale (MPOS) Terminal

Secure Microcontroller DC/DC Step-Up/Down Converter DC/DC Step-Up Converter USB Charger ESD Protection ESD Protection

Point-Of-Sale Terminal

Smart-Card Reader Magstripe Reader Power and Battery Management LCD Display Secure µC Security Manager Audio USB RS-232

Pin Pads and Kiosks

RS-232 RS-485 USB LCD Display Power Supply Smart-Card Interface Smart-Card Controller Secure Microcontroller Magstripe


Demo: Enable Trusted Sensors and Notification for IoT Applications
5:49 min
September 2016

DS28E35 DeepCover® Secure Authenticator
2:38 min
July 2013

Demonstrating Cryptographic Hash, Signatures, and Authentication
11:53 min
October 2017

Add Counterfeit Protection with Maxim's DeepCover® Secure Authenticators
3:36 min
May 2014

Safeguard Your Connected Products with Turnkey Security
4:00 min
May 2017

Using the MAXREFDES155 – Protecting the Internet of Things
8:08 min
March 2017

ChipDNA–Defend Your IoT Designs from Hackers
2:14 min
November 2017

How to Setup the DS28E38 Evaluation Kit and Perform ECDSA Authentication
7:29 min
November 2017

Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security
8:57 min
February 2018

Secure Boot and Secure Download - Part 1: Protecting IoT Devices with Secure Authentication
5:36 min
February 2018

Secure Boot and Secure Download - Part 3: Using the DS28C36
4:33 min
February 2018

Mobile POS: An Advanced Cryptographic and Physical Security Solution
1:51 min
November 2014