Category Archives: Hardware

Introducing the world’s most innovative 2-pin, self-powered Serial EEPROM


Atmel has launched the industry’s most innovative Single-Wire EEPROM with only two-pins, making it ideal for the Internet of Things, wearables, consumable, battery and cable identification markets.


The advent of smart gadgets has increasingly made it necessary for embedded systems to store small amounts of information about the system itself. While a majority of memory technology development has been dedicated to increased capacity at low costs, a new class of memory applications have arisen that demand only modest amounts of memory. However, because these memories provide capabilities that might be considered administrative or overhead, space and power must be kept down to an absolute minimum in order to keep the extra functionality from pushing the system beyond its power and size requirements.

MemoryAT21CS01_Google+_1160x655_Final

Fortunately, a new class of serial EEPROM has emerged to satisfy this need. Meet the Atmel AT21CS01/11 SEEPROM. Tapping into our legacy of delivering “advanced technology for memory and logic,” hence our name, Atmel has launched the industry’s most innovative Single-Wire EEPROM with only two-pins — a data pin and ground pin for operation — making the new family ideal for the Internet of Things, wearables, consumable, battery and cable identification markets.

The AT21CS01/11 are self-powered, eliminating the need for a power source or Vcc pin, with a parasitic power scheme over the data pin. This latest set of devices provide best-in-class ultra-low power standby of 700nA, 200µA for write current, and 80µA for read current at 25 degree Celsius—delivering just one-third of the power of leading competitors.

With confined spacing in smaller IoT, wearables, battery and cable identification applications, the AT21CS01/11 eradicate the need for external capacitors and rectifiers with its parasitic power scheme over a single data pin. Additionally, the new devices have an ultra-high write endurance capability to allow more than one million cycles for each memory location to meet the requirements for today’s high-write endurance applications.

The AT21CS01/11 products include a simple product identification with a plug-and-play 64-bit unique serial number in every device, making it ideal for connected gadgetry in today’s IoT world. The new Single-Wire EEPROM family also delivers industry-leading electrostatic discharge (ESD) rating (IEC 61000-4-2 Level 4 ESD Compliant), so applications such as cables and consumables can tolerate exposure to the outside environment or direct human contact while still delivering flawless performance.

Memor

“With Atmel’s legacy rooted in memory, we are excited to bring a new generation of innovative ‘true 2-pin’ serial EEPROMs that are parasitically powered,” explained Padam Singh, Atmel’s Director of Marketing, Memory Products. “Our new Single-Wire EEPROM family makes it very convenient to add serial EEPROM using just one-pin from the MCU/MPU without the need to route the Vcc to the device, delivering significant board space savings while simplifying the layout. In addition, the plug-and-play 64-bit serial number is the easiest way to add identification to various accessories and consumables. We look forward to proliferating these products to next-generation applications and delivering more value-added solutions and industry-firsts.”

The recently-revealed products follow the I2C protocol, allowing for an easy migration from existing EEPROM with less overhead and capability to connect up to eight devices on the same bus. The AT21CS01 offers a security register with a 64-bit factory programmed serial number and an extra 16-bytes of user programmable and permanently lockable storage, delivering a guaranteed unique serial number for inventory tracking, asset tagging and can permanently protect the data if needed.

There are two variants of the device available to support different voltage requirements. The AT21CS01 is targeted for low-voltage applications operating at 1.7V-3.6V. For applications that require higher voltage ranges such as Li-Ion/polymer batteries, the AT21CS11 will support 2.7V-4.5V operating range and is the ideal product to meet IEEE1725 specifications for electronic identification of battery packs.

Interested? The AT21CS01 is now available in production quantities in 3-lead SOT23, 8-lead SOIC and 4-ball WLCSP, while the AT21CS11 will debut later this year in Q4. Read more about the 2-pin, self-powered Serial EEPROM series here.

JAR is a coin-sized biometric crypto key


Instead of using passwords to access websites, JAR lets you login or register with the touch of your finger.


With seemingly a new data breach emerging every week, cybersecurity has become a key concern among a majority of consumers. Despite these incidents, many people still rely on stupidly simple passwords. Just how simple, you ask? Take a look at this recently-revealed list from 2014. The problem with these codes is that most, if not all, of us are pretty bad at remembering them, and with so many different ones for different sites, we rely upon insecure behaviors.

jar-with-background-handheld-962x644

Fortunately, one German startup has devised a solution to the ever-growing password epidemic with a coin-sized gadget. Equipped with its own fingerprint reader, JAR connects to your mobile device via its audio jack, enabling you to securely access your online accounts with a single touch. Just how secure are we talking? Its creators claim that the encryption is so strong that it would take a hacker 6.4 quadrillion years to access your data.

The JAR, which is tiny enough to be attached to a keyring, runs an asymmetrical encryption method based on a pair of 2048-bit RSA keys. To gain entry, gently place your finger on its built-in biometric reader and presto! Because each message is encrypted separately, there’s no way to derive one message from the previous message; each encrypted message broadcasted is non-deterministic and pseudorandom.

565ca70e08afed8e33bc6a5bbe39a6cc_original

“Your devices will only unlock for the most recent message, so a hacker is unable to unlock your devices by re-broadcasting an old message,” the team explains. “Only devices that you’ve set up with your JAR will have the ability to interact with it. A device still has to verify its legitimacy through an automatic encrypted handshake in order to interact with your JAR.”

Should you lose your JAR, not to worry as it can be easily deactivated. When this occurs, a message is immediately sent to all of your devices, letting them know that they should not prompt access to your accounts safeguarded by the lost piece.

cb41135932cbd46a73aa5dbe5620eecf_original

Looking ahead, JAR will also offer a range of services including reliable cloud storage, an offline data vault, and an encrypted messenger, among several others from third parties. At the moment, JAR is available in two colors (soft white and dark grey) as well as two different sizes (1.6” and 1.4”).

Ready to forget about passwords? Head over to JAR’s Kickstarter page, where the team is currently seeking $108,305. Units are expected to begin shipping in January 2016.

You can hack what?!


From skateboards and trucks to medical devices and rifles, these recent hacks show that every “thing” is at risk.


Musicians have the GRAMMYs. Actors have the Emmys. Athletes have the ESPYS. Hackers, well they have Black Hat. Every year, more than 10,000 security pros converge in Las Vegas to explore the latest network flaws, device vulnerabilities and cyber attacks of the past, present and future. While these demonstrations typically focused on how to take control of computers, given the rise of the Internet of Things, it seems like just about any “thing” can be susceptible to malicious intruders. As we gear up for what will surely be an insane amount of coverage across all media channels, here are a few hacks that’ll surely grab your attention.

OnStar vehicles

Serial hacker Samy Kamkar has devised a tablet-sized box that could easily tap into and wirelessly take control of a GM car’s futuristic features. With connected car security a hot topic at this year’s conferences, the Los Angeles-based entrepreneur has created a device — dubbed OwnStar — that can locate, unlock and remotely start any vehicle with OnStar RemoteLink after intercepting communication between the RemoteLink mobile app and OnStar servers.

clky0h4wgaesaly

The system is driven by a Raspberry Pi and uses an ATmega328 to interface with an Adafruit FONA for cellular connection. After opening the OnStar RemoteLink app on a smartphone within Wi-Fi range of the hacking gadget, OwnStar works by intercepting the communication. Essentially, it impersonates the wireless network to fool the smartphone into silently connecting. It then sends specially crafted packets to the mobile device to acquire additional credentials and notifies the attacker over 2G about the new vehicle it indefinitely has access to, namely its location, make and model.

With the user’s login credentials, an attacker could do just about anything he or she wants, including tracking a car, unlocking its doors and stealing stuff nside (when carjacking meets car hacking), or starting the ignition from afar. Making matters worse, Kamkar says a remote control like this can give a malicious criminal the ability to drain the car’s gas, fill a garage with carbon monoxide or use its horn to drum up some mayhem on the street. The hacker can also access the user’s name, email, home address, and last four digits of a credit card and expiration date, all of which are accessible through an OnStar account.

Tesla Model S

Researchers said they took control of a Tesla Model S car and turned it off at low speed, one of six significant flaws they found that could provide hackers total access to vehicles, the Financial Times reported.

Tesla

Kevin Mahaffey, CTO of Lookout, and Marc Rogers, principal security researcher at Cloudflare, claimed they decided to hack a Tesla car because the company has a reputation for understanding software than most automakers. The hackers had to physically gain entry into the vehicle, which made it more difficult than many other attacks. Once they were connected through an Ethernet cable, they were later able to access the systems remotely. These included the screens, speedometer, windows, electronic locks, and the ignition.

“We shut the car down when it was driving initially at a low speed of five miles per hour. All the screens go black, the music turns off and the handbrake comes on, lurching it to a stop,” Rogers describes.

Tesla has since issued a patch to fix the flaws.

Electric skateboards

After his own electric skateboard abruptly stopped working last year, unable to receive commands from its remote control, Richo Healey decided to delve a bit deeper into the incident. What he discovered was that, the volume of Bluetooth traffic in the surrounding the intersection interfered with his RC’s connection to the board.

Hack

Cognizant of this defect, Healy teamed up with fellow researcher Mike Ryan to examine the hackability of his and other e-skateboards on the market today. The result was an exploit they developed called FacePlant that can give them complete control of someone’s gadget.

The duo describes FacePlant as “basically a synthetic version of the same RF noise” that Healey experienced at the intersection in his hometown of Melbourne. The exploit ultimately allows them to gain total control of someone cruising down the street or sidewalk, which means they could easily cold stop a board or send it flying in reverse, tossing the rider.

They found at least one critical vulnerability in each board they examined, all of which hinge on the fact that the manufacturers of the boards failed to encrypt the communication between the remotes and the boards. The attack for controlling them is essentially identical across the board (no pun intended), but the mechanism for conducting it differs somewhat for each one. As a result, they’ve only completed an exploit for the Boosted board at this time.

Square readers

Three former Boston University students have highlighted a vulnerability in the hardware of Square readers that would enable hackers to convert it into a credit card skimmer in less than 10 minutes. The rigged PoS device could then be used to steal personal information with a custom-recording app.

h_butoday_register.02-640859785726568a44d6465746406445

Computer engineering grads Alexandrea Mellen, John Moore and Artem Losev unearthed the flaw last year in a project for their cybersecurity class. They also found that Square Register software could be hacked to enable unauthorized transactions at a later date.

“The merchant could swipe the card an extra time at the point of sale. You think nothing of it, and a week later when you’re not around, I charge you $20, $30, $100, $200… You might not notice that charge. I get away with some extra money of yours,” Moore explains.

The group says there is no evidence that either of the vulnerabilities have been employed to scam credit card holders, but does warn that their findings raise red flags for the fast-emerging mobile commerce industry.

Medical devices

The U.S. Food and Drug Administration and Department of Homeland Security have both issued advisories warning hospitals not to use the Hospira infusion system Symbiq due to cybersecurity risks. While no known attack has occurred, hackers could theoretically tamper with the intravenous infusion pump by accessing a hospital’s network.

“This could allow an unauthorized user to control the device and change the dosage the pump delivers, which could lead to over- or under-infusion of critical patient therapies,” the FDA said in a statement.

Hospira has since discontinued the manufacture and distribution of the Symbiq Infusion System, because of unrelated issues, and is working with customers to transition to alternative systems. However, amid the latest string of security woes, the FDA strongly encourages healthcare facilities to begin transitioning to other infusion systems as soon as possible.

This isn’t the first time vulnerabilities in medical devices have been in the spotlight. Back in 2014, Scott Erven and his team found that drug infusion pumps could be remotely manipulated to change the dosage doled out to patients. On top of that, a WIRED article noted that “Bluetooth-enabled defibrillators could be hacked to deliver random shocks to a patient’s heart or prevent a medically needed shock from occurring, X-rays that can be accessed by outsiders lurking on a hospital’s network; temperature settings on refrigerators storing blood and drugs that can be reset, causing spoilage; and digital medical records that can be altered to cause physicians to misdiagnose, prescribe the wrong drugs or administer unwarranted care.”

Semi trucks

Asset-tracking systems made by Globalstar and its subsidiaries were discovered to have flaws that would enable a hijacker to track valuable and sensitive cargo and then disable the location-tracking device used to monitor it. From here, criminals could potentially fake the coordinates to make it appear as if the shipment was still traveling its intended route. Or, as WIRED points out, a hacker who simply wanted to cause chaos could add false coordinates to companies and militaries monitoring their assets and shipments to make it appear as if they’d been taken over.

Intercepting-Satellite-Comms-from-Plane-768x1024

These findings were brought to light by Colby Moore, a researcher with the security firm Synack. The same vulnerable technology isn’t only employed for tracking cargo, it’s used in people-tracking systems for search-and-rescue missions and in SCADA environments as well.

As Moore tells the magazine, the Simplex data network that Globalstar uses for its satellites doesn’t encrypt communication between the tracking devices, orbiting satellites and ground stations, nor does it require the communication be authenticated so that only legitimate data gets sent. Subsequently, a hacker could intercept the communication, spoof it or jam it.

“Each device has a unique ID that’s printed on its outer casing. The devices also transmit their unique ID when communicating with satellites, so an attacker targeting a specific shipment could intercept and spoof the communication. Often the unique IDs on devices are sequential, so if a commercial or military customer owns numerous devices for tracking assets, an attacker would be able to determine other device IDs, and assets, that belong to the same company or military based on similar ID numbers.”

Rifles

Security researchers Runa Sandvik and Michael Auger have hacked a pair of $13,000 TrackingPoint self-aiming rifles. The duo has developed a set of techniques that could let an attacker compromise the gun via its Wi-Fi connection and exploit vulnerabilities in its software. According to WIREDthe tactics can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing.

Hack

“The first of these has to do with the Wi-Fi, which is off by default, but can be enabled so you can do things like stream a video of your shot to a laptop or iPad. When the Wi-Fi is on, the gun’s network has a default password that allows anyone within Wi-Fi range to connect to it. From there, a hacker can treat the gun as a server and access APIs to alter key variables in its targeting application.”

Additionally, the researchers shared that a hacker could alter the rifle in a way that would persist long after that Wi-Fi connection is broken. It’s even possible, they tell WIRED, to implant the gun with malware that would only take effect at a certain time or location-based on querying a user’s connected phone.

Hijacking data as sound waves

Reuters has reported that a team of researchers led by Ang Cui have demonstrated the ability to hijack standard equipment inside computers, printers and millions of other electronic devices to send information through sound waves.

funtenna.jpg.CROP.promovar-mediumlarge

The project, called Funtenna, refers to a software payload that intentionally causes its host hardware to act as an improvised RF transmitter using existing hardware, which is typically not designed for electromagnetic emnation.

The program works by taking control of the physical prongs on general-purpose input/output circuits and vibrates them at a frequency of the researchers’ choosing, which can be audible or not. The vibrations can be picked up with an AM radio antenna a short distance away.

The new transmitting antenna adds another potential channel that would be hard to detect because no traffic logs would catch data leaving the premises. Cui tells Reuters that hackers would need an antenna close to the targeted building to pick up the sound waves, as well as find some way to get inside a targeted machine and convert the desired data to the format for transmission.

Smart homes

Tobias Zillner and Sebastian Strobl of Cognosec uncovered flaws in the Zigbee standard, which is widely used by countless IoT appliances. Specifically, the researchers shed light on the fact that the protocol’s reliance on an insecure key link with smart gadgets opens the door for hackers to spoof them and potentially gain control of your connected home. According to Cognosec, the items that have been tested and proven to be susceptible include ight bulbs, motion sensors, temperature sensors and door locks.

“If a manufacturer wants a device to be compatible to other certified devices from other manufacturers, it has to implement the standard interfaces and practices of this profile. However, the use of a default link key introduces a high risk to the secrecy of the network key,” the team states in its recent paper. “Since the security of ZigBee is highly reliant on the secrecy of the key material and therefore on the secure initialisation and transport of the encryption keys, this default fallback mechanism has to be considered as a critical risk. If an attacker is able to sniff a device and join using the default link key, the active network key is compromised and the confidentiality of the whole network communication can be considered as compromised.”

[Images: Samy Kamkar, Tesla, Colby Moore, Square, WIRED, Ang Cui]

Report: IoT devices will nearly triple by 2020 to reach 38 billion


Over 80% of companies increased revenue by investing in Internet of Things, a new study has found.


While there already may be more than two connected devices accessing the web for every person on Earth, this is merely the ground floor of the Internet of Things’ gargantuan promise.

internet_of_things2

In fact, new data from Juniper Researcher has revealed that the number of smart devices is expected to surpass 38.5 billion in 2020, up from 13.4 billion in 2015, constituting an increase of 285%. And though it may appear that connected home-centric applications have been the focus of attention as of late, it will actually be the industrial and public services sector – such as retail, agriculture, buildings and smart grid applications – that will form the majority of the user base.

The report goes on to list Michelin and John Deere as examples of companies who have successfully transitioned their businesses towards being service-based companies through the use of IoT, as opposed to their previous incarnations as product vendors. Most notably, the tire maker has begun deploying sensors in trucks to monitor driver performance and better mange fuel consumption, while the tractor giant has been using smart machinery to provide real-time analysis to farmers.

Juniper notes that interoperability will play a pivotal role in the IoT’s progression. While conflicting standards continues to slow down its pace, there are signs that standards bodies and alliances are beginning to come together to overcome these hurdles.

“The IoT represents the combination of devices and software systems, connected via the Internet, that produce, receive and analyze data. These systems must have the aim of transcending traditional siloed ecosystems of electronic information in order to improve quality of life, efficiency, create value and reduce cost,” Juniper added.

Aside from that, Tata Consulting Services has published a study that suggests 26 companies (including 14 in the United States) plan on spending $1 billion or more on IoT initiatives this year. These organizations will stem from seven industries: six from banking and financial services, five from automotive, four from travel, hospitality and transportation, four from high tech, three from insurance, two telecommunications firms, one from retail and another from healthcare.

Manufacturing along with the travel, hospitality and transportation sectors are planning to spend 0.6% of revenue this year, while media and entertainment companies will dish out 0.57% — this is significantly more than the 0.4% average spending in banking and financial services. The report also shows that companies predict their IoT budgets to continue increasing year-on-year, with spending expected to grow by 20% by 2018 to $103 million.

“Across the board, those companies investing in IoT are reporting significant revenue increases as a result of IoT initiatives with an average increase of 15.6% in 2014. Almost one in ten (9%) saw a rise of at least 30% in revenue,” TCS writes. “Company executives still see the IoT as a growing area for businesses, with 12% identifying a planned spend of $100 million in 2015 and 3% looking to invest a minimum of $1 billion among the 795 companies surveyed.”

Companies at the very forefront of this drive for innovation through IoT have seen the biggest benefits from their investments. The top 8% of respondents, based on ROI from IoT, demonstrated a staggering 64% average revenue gain in 2014 as a direct result of these investments. TCS points out that the biggest business impact, at the moment, is that companies can offer their customers more bespoke products and services. Yet, by 2020, this will convert from marketing functions to increased sales, through adding considerable value to the customer.

tatabizmodelchange

This is reflected in the finding that the most frequent use of IoT technologies by companies is tracking customers through mobile apps, used by almost half of all businesses (47%). Over 50% of IoT leaders admit to investing in IoT to track their products and how these were performing, whereas this is only the case with 16.1% of the respondents with the lowest ROI from IoT.  What’s more, nearly eight in 10 enterprises (79%) surveyed claim to have IoT initiatives in place at the moment to better understand customers, products, the locations in which they do business with customers or their supply chains.

According to the study, revenue increases are being experienced worldwide with all regions reporting double-digit growth in 2014. However, it’s the U.S. firms that have enjoyed the largest gains of 18.8%. Europe as a whole is seeing a 12.9% jump, while APAC has shown a 14.1% rise and Latin America an impressive 18.3%.

Meanwhile, North American companies will spend 0.45% of revenue this year on IoT initiatives, while European companies will spend 0.40%. APAC companies will invest 0.34% of revenue in the IoT, and Latin American firms will spend 0.23% of revenue. This has led to North American and European companies more frequently selling smart, connected products than are APAC and Latin American companies.

Despite the encouraging data on investment and its impact on revenue growth, the report found that major challenges remain in realizing the promise of the Internet of Things for businesses across all sectors, namely corporate culture (ability to get employees to change the way they think), leadership (having top executives who believe in the IoT) and technology (questions around big data, integration with enterprise systems and security).

The healthcare sector has been hailed as having the greatest potential to benefit from the IoT, but remains one of the most underdeveloped industries due to regulatory restrictions and data security concerns that currently hinder innovation. The sector plans to spend just 0.3% of revenue in 2015, but will be increasing this investment by at least 30% come 2018. In comparison, executives in the industrial manufacturing sector are reporting the largest increase in revenue from IoT, with an average 28.5%, followed by financial services (17.7%), and media and entertainment (17.4%). The automotive industry has the lowest revenue gain with just a 9.9% increase.

[Image: Tata Consultancy Services]

NASA chip reflects Wi-Fi to improve your wearable device’s battery life


This new technology could reduce the power needed to send information from wearables.


Researchers at NASA’s Jet Propulsion Lab and UCLA are currently working on a Wi-Fi reflector chip that they say would drastically improve battery life in wearable devices by reducing the power needed to transmit or receive information to computers and cellular and Wi-Fi networks.

NASAWifi1

The chip uses existing wireless signals to reflect information back to a router or cell tower instead of the wearable generating the signal itself. According to Adrian Tang of NASA’s Jet Propulsion Lab, not only does this drastically reduce power consumption, the solution also transmits Wi-Fi signal three times faster than traditional Wi-Fi.

Information transmitted to and from a wearable device is encoded as 1s and 0s, just like data on a computer. When incoming energy is absorbed by the circuit, that’s a “0,” and if the chip reflects that energy, that’s a “1.” This simple switch mechanism uses very little power and allows for the fast transfer of information between a wearable device and a computer, smartphone, tablet or other technology capable of receiving the data.

Tang, who is collaborating on the project with UCLA’s M.C. Frank Chang, says one of the challenges is that the wearable device isn’t the only object in a room that reflects signals. Keep in mind, there can be walls, floors, ceilings and furniture, among several other things. The chip in the wearable needs to differentiate between the real Wi-Fi signal and the reflection from the background. To overcome this, Tang and Chang developed a wireless silicon chip that constantly senses and suppresses background reflections, enabling the Wi-Fi signal to be transmitted without interference from surrounding objects.

The technologists have tested the system at distances of up to 20 feet. At about 8 feet, they achieved a data transfer rate of 330 megabits per second, which is about three times the current Wi-Fi rate, using about a thousand times less power than a regular Wi-Fi link.

chip20150722

“You can send a video in a couple of seconds, but you don’t consume the energy of the wearable device. The transmitter externally is expending energy – not the watch or other wearable,” Chang explains.

A base station and Wi-Fi service ares still required in order for the system to work. Since power is taken from the base station, computer, Wi-Fi or other network supporting the chip, the source will need to be plugged in or have long battery life. Researchers are working to minimize those energy limitations, but Tang is optimistic that the solution will be commercialized. For example, astronauts and robotic spacecraft could potentially use this technology to transmit images at a lower cost to their precious power supplies. This might also allow more images to be sent at a time.

The patent application for this technology is jointly owned by the California Institute of Technology, which manages JPL for NASA and UCLA. You can read more about it here.

[Images: NASA/JPL-Caltech]

NailO turns your thumb into a mini wireless trackpad


This wearable input device from MIT’s Media Lab is in the form of a commercialized nail art sticker.


You’ve been there before: Your arms are full and the phone rings. You put everything down only to find out that it was a telemarketer. Or, while in the middle of preparing dinner, you need to scroll down the recipe page on your tablet. With your hands a mess, you first have to wipe them off before proceeding with the instructions. Fortunately, situations like these may be a thing of the past thanks to a new project from MIT Media Lab. Led by Cindy Hsin-Liu Kao, a team of researchers have developed a new wearable device, called NailO, that turns a users thumbnail into a miniature wireless trackpad.

image-041815-nailo-wireless-thumb-device

Resembling one of those stick-on nail accessories, NailO works as a shrunken-down trackpad that connects to a mobile device. This enables a wearer to perform various functions on a paired phone or PC through different gestures. And for the fashion-conscious, its creators envision a future with detachable decorative top membranes that are completely customizable to better coordinate with a wearer’s individual style.

Along with its use in hands-full activities like cooking or doing repairs, another potential application for the quarter-sized trackpad includes discreetly sending a quick text message in settings where whipping out a smartphone would be rude. After all, running a finger over a thumbnail is a natural occurrence, so a majority of folks would hardly notice this as a deliberate action to control a gadget.

“Fingernails are an easily accessible location, so they have great potential to serve as an additional input surface for mobile and wearable devices.”

Screen-Shot-2015-04-16-at-9.03.13-PM

Crammed within the small package of the NailO lie a LiPo battery, a matrix of sensing electrodes, a Bluetooth Low Energy module, a capacitive-sensing controller, and an ATmega328 MCU. With an average power consumption of 4.86 mA, the device can wirelessly transmit data for at least two hours — an ample amount of time for those in a meeting, in class, in a movie theater, or while working around the house.

In order to get started, wearers must first power it up by maintaining finger contact with it for two or three seconds. From there, users can move their index finger up-and-down or left-and-right across its surface, guiding the mouse on its synced device. To select something onscreen, simply press down a finger as if it were a mouse or a touchscreen.

“As the site for a wearable input device, however, the thumbnail has other advantages: It’s a hard surface with no nerve endings, so a device affixed to it wouldn’t impair movement or cause discomfort. And it’s easily accessed by the other fingers — even when the user is holding something in his or her hand,” the team writes.

JA15MIT77MassAve.1x519

For their initial prototype, the researchers built their sensors by printing copper electrodes on sheets of flexible polyester, which allowed them to experiment with a range of different electrode layouts. But in future experiments, the team notes that they will be using off-the-shelf sheets of electrodes like those found in some trackpads.

The Media Lab crew has also been in discussion with many Shenzhen-based battery manufacturers and have identified a technology that they think could yield a battery that fits in the space of a thumbnail — yet is only 0.5mm thick. In order to further develop the size of a nail art sticker, the Media Lab worked with flexible PCB factories for a slimmer and bendable prototype, which could conform to the curvature of a fingernail.

We’ll have to go out on a limb and say it: looks like this project ’nailed’ it! Want to learn more? Head over to the project’s official page here, as well as read MIT Technology Review’s latest piece on finger-mounted input devices.

6 memory considerations for Cortex-M7-based IoT designs


Taking a closer look at the configurable memory aspects of Cortex-M7 microcontrollers.


Tightly coupled memory (TCM) is a salient feature in the Cortex-M7 lineup as it boosts the MCU’s performance by offering single cycle access for the CPU and by securing the high-priority latency-critical requests from the peripherals.

Cortex-M7-chip-diagramLG

The early MCU implementations based on the ARM’s M7 embedded processor core — like Atmel’s SAM E70 and S70 chips — have arrived in the market. So it’d be worthwhile to have a closer look at the configurable memory aspects of M7 microcontrollers and see how the TCMs enable the execution of deterministic code and fast transfer of real-time data at the full processor speed.

Here are some of the key findings regarding the advanced memory architecture of Cortex-M7 microcontrollers:

1. TCM is Configurable

First and foremost, the size of TCM is configurable. TCM, which is part of the physical memory map of the MCU, supports up to 16MB of tightly coupled memory. The configurability of the ARM Cortex-M7 core allows SoC architects to integrate a range of cache sizes. So that industrial and Internet of Things product developers can determine the amount of critical code and real-time data in TCM to meet the needs of the target application.

The Atmel | SMART Cortex-M7 architecture doesn’t specify what type of memory or how much memory should be provided; instead, it leaves these decisions to designers implementing M7 in a microcontroller as a venue for differentiation. Consequently, a flexible memory system can be optimized for performance, determinism and low latency, and thus can be tuned to specific application requirements.

2. Instruction TCM

Instruction TCM or ITCM implements critical code with deterministic execution for real-time processing applications such as audio encoding/decoding, audio processing and motor control. The use of standard memory will lead to delays due to cache misses and interrupts, and therefore will hamper the deterministic timing required for real-time response and seamless audio and video performance.

The deterministic critical software routines should be loaded in a 64-bit instruction memory port (ITCM) that supports dual-issue processor architecture and provide single-cycle access for the CPU to boost MCU performance. However, developers need to carefully calibrate the amount of code that need zero-wait execution performance to determine the amount of ITCM required in an MCU device.

The anatomy of TCM inside the M7 architecture

The anatomy of TCM inside the M7 architecture.

3. Data TCM

Data TCM or DTCM is used in fast data processing tasks like 2D bar decoding and fingerprint and voice recognition. There are two data ports (DTCMs) that provide simultaneous and parallel 32-bit data accesses to real-time data. Both instruction TCM and data TCM — used for efficient access to on-chip Flash and external resources — must have the same size.

4. System RAM and TCM

System RAM, also known as general RAM, is employed for communications stacks related to networking, field buss, high-bandwidth bridging, USB, etc. It implements peripheral data buffers generally through direct memory access (DMA) engines and can be accessed by masters without CPU intervention.

Here, product developers must remember the memory access conflicts that arise from the concurrent data transfer to both CPU and DMA. So developers must set clear priorities for latency-critical requests from the peripherals and carefully plan latency-critical data transfers like the transfer of a USB descriptor or a slow data rate peripheral with a small local buffer. Access from the DMA and the caches are generally burst to consecutive addresses to optimize system performance.

It’s worth noting that while system memory is logically separate from the TCM, microcontroller suppliers like Atmel are incorporating TCM and system RAM in a single SRAM block. That lets IoT developers share general-purpose tasks while splitting TCM and system RAM functions for specific use cases.

A single SRAM block for TCM and system memory allows higher flexibility and utilization

A single SRAM block for TCM and system memory allows higher flexibility and utilization.

5. TCM Loading

The Cortex-M7 uses a scattered RAM architecture to allow the MCU to maximize performance by having a dedicated RAM part for critical tasks and data transfer. The TCM might be loaded from a number of sources, and these sources aren’t specified in the M7 architecture. It’s left to the MCU designers whether there is a single DMA or several data loading points from various streams like USB and video.

It’s imperative that, during the software build, IoT product developers identify which code segments and data blocks are allocated to the TCM. This is done by embedding programs into the software and by applying linker settings so that software build appropriately places the code in memory allocation.

6. Why SRAM?

Flash memory can be attached to a TCM interface, but the Flash cannot run at the processor clock speed and will require caching. As a result, this will cause delays when cache misses occur, threatening the deterministic value proposition of the TCM technology.

DRAM technology is a theoretical choice but it’s cost prohibitive. That leaves SRAM as a viable candidate for fast, direct and uncached TCM access. SRAM can be easily embedded on a chip and permits random accesses at the speed of the processor. However, cost-per-bit of SRAM is higher than Flash and DRAM, which means it’s critical to keep the size of the TCM limited.

Atmel | SMART Cortex-M7 MCUs

Take the case of Atmel’s SMART SAM E70, S70 and V70/71 microcontrollers that organize SRAM into four memory banks for TCM and System SRAM parts. The company has recently started shipping volume units of its SAM E70 and S70 families for the IoT and industrial markets, and claims that these MCUs provide 50 percent better performance than the closest competitor.

SAM-E70_S70_BlockDiagram_Lg_929x516

Atmel’s M7-based microcontrollers offer up to 384KB of embedded SRAM that is configurable as TCM or system memory for providing IoT designs with higher flexibility and utilization. For instance, E70 and S70 microcontrollers organize 384KB of embedded SRAM into four ports to limit memory access conflicts. These MCUs allocate 256KB of SRAM for TCM functions — 128 KB for ITCM and DTCM each — to deliver zero wait access at 300MHz processor speed, while the remaining 128KB of SRAM can be configured as system memory running at 150MHz.

However, the availability of an SRAM block organized in the form of a memory bank of 384KB means that both system SRAM and TCM can be used at the same time.The large on-chip SRAM of 384KB is also critical for many IoT devices, since it enables them to run multiple communication stacks and applications on the same MCU without adding external memory. That’s a significant value proposition in the IoT realm because avoiding external memories lowers the BOM cost, reduces the PCB footprint and eliminates the complexity in the high-speed PCB design.

Building an IoT coffee maker with realtime capacity monitoring


Now you can see how much coffee is left in the pot without leaving your chair. 


You’ve all been in the situation before: You arrive at the office coffee maker in the morning only to find that it’s empty. If only you could curb that disappointment with realtime reporting on exactly how much coffee is left in the pot. Well fortunately for you, PubNub has harnessed the power of the ATmega328P MCU and the PubNub Data Stream Network to build the IoT Coffee Maker with realtime coffee capacity monitoring. The project works by collecting coffee volume levels and then streams the data in realtime to a live-updating UI.

In the video below, the coffee maker’s creator Kurt Clothier introduces his project, walks through some of the steps to build it, and shows it in action. If you want to get to creating one for yourself or your workplace, be sure to check out the entire IoT coffee pot tutorial and live demo on PubNub.

In a nutshell, the Atmel IoT coffee pot gathers volume data based on the weight of the coffee pot using a scale. The ATmega328P MCU is the brains behind the operation, while an ESP8266 is used for Internet connection. The volume data is then sent to a realtime web UI and visualized in realtime via PubNub Pub/Sub Messaging and the EON JavaScript framework.

atmel iot coffee maker diagram

The project requires the following:

Web UI updates the % of coffee left in realtime.

Web UI updates the % of coffee left in realtime.

Obviously, this tutorial can be expanded outside the kitchen to a broad number of powerful IoT use cases. With this same design, you can track readings from any number of sensors, and stream its data in realtime to any number of subscribers in realtime. Thinking big, you can implement similar technology in large scale industrial IoT settings, like agriculture, oil or medical.

You can even get rid of the scale altogether and use these concepts to collect data from anything with a segmented LCD screen. With that said, Clothier and the PubNub team would love to see what you come up with, so be sure to let them know about your awesome project! But for now, let’s enjoy the fact that we know exactly what percentage of the coffee pot is full.

Voxel8 raises $12M to bring the world’s first electronics 3D printer to market


Voxel8 enables designers and engineers to create freeform, 3D-printed circuits in place of conventional circuit boards.


Traditionally, electronic circuit boards are manufactured in standard shapes. However, the team behind Voxel8 has unveiled a new 3D printing platform that brings together functional materials, hardware and software to give designers a once inconceivable way to integrate electronics into their projects.

voxel8-announces-first-new-electronics-3d-printer-now-available-for-pre-order-1

While previous electronics printing efforts have involved either retrofitting existing machines or spitting out PCBs using inkjet printers, the Massachusetts-based company believes it has developed the world’s first 3D electronics printer. Traditionally speaking, most printers are built around FDM technology, which spits out single-material objects. However, as seen earlier this year at CES, Voxel8 will enable users to blend plastic, conductive ink and other embedded components into the same design. In other words, Makers will be able to create fully-functional electronic circuitry right into their gizmos and gadgets, ranging from quadcopters to phones to thumb drives.

And from the looks of things, it will become a reality sooner than you may think. That’s because the startup has raised $12 million to bring these revolutionary devices to the desks of engineers and designers worldwide. Braemar Energy Ventures and ARCH Venture Partners led the Series A round, joined by Autodesk, through its Spark Investment Fund, and In-Q-Tel

“The Voxel8 3D printing platform is disrupting the traditional design and manufacture of electronic devices,” said Clinton Bybee, co-founder and managing director at ARCH Venture Partners. “Not only does the Voxel8 3D printer enable the design of entirely new devices, it also circumvents the need for traditional tooling, inventory and supply chains.”.

voxel8-electronics-3d-printer-1

The innovative printer, which was founded by Dr. Jennifer A. Lewis in partnership with Autodesk, boasts interchangeable cartridges that can print out objects in both PLA plastic and conductive silver ink. The team reveals that this ink is five thousand times more conductive than other pastes and filaments currently used in 3D printing, and indeed, carries higher currents capable of supplying power to small electric motors and actuators.

The ink is specifically designed so that it can be deposited by a 250 micron nozzle, dried in just five minutes at room temperature and used to reliably interconnect TQFP integrated circuits. In fact, it will enable users to easily wire together chips and other electronic components within their 3D-printed objects, making way for a degree of creative freedom that is simply not possible through standard manufacturing methods.

voxel8-announces-first-new-electronics-3d-printer-now-available-for-pre-order-2

Embodying a C-shaped design, Voxel8 offers users optimal transparency into the device as their parts are being constructed. On the hardware side, the platform is driven by a RAMBo 1.3 (ATmega2560/ATmega32U2). Beyond that, it is equipped with a 4.3-inch touchscreen, USB and Wi-Fi connectivity, as well as a highly-repeatable kinematically coupled bed that uses magnets to ensure precision as a Maker manually inserts the components of interest, then continues printing the part right where it left off.

The printer has a layer resolution of 200 microns, and can even create objects up to 4” x 6″ x 4” in size. Through its collaboration with Autodesk, Voxel8 paves the way for entirely new form factors with Project Wire, a Spark-powered tool that helps design 3D printable electronic devices. What’s more, its unique software lets the machine know when it’s time to insert a component and will pause to allow the users to manually do so.

Voxel8_Quad_Copter_1-1

Interested in printing your own novel 3D electronic devices? Voxel8 has already received preorders from R&D departments of several large companies throughout the aerospace, automotive, defense, medical and apparel industries. The first batch of units are expected to begin shipping later this year. In the meantime, head on over to Voxel8’s official page to learn more.

Report: 100% of tested smartwatches exhibit security flaws


HP report finds a majority of smartwatches to have insufficient authentication, lack of encryption and privacy concerns.


While wearable technology continues to increase in popularity, it appears that embedded security may have been left behind. That is according to new research conducted by HP, which discovered serious vulnerabilities in a vast majority of today’s most popular wrist-adorned timekeeping devices.

Wathc

Without question, the wearables space has experienced tremendous growth over the last couple of months, with analysts now projecting the space to surge upwards of 150 million units by 2019. However, as smartwatches like the Apple Watch, the Motorola Moto 360 and the Samsung Gear become mainstream, malicious hackers have found a new entry point for consumers’ most valuable and confidential data.

For its “Smartwatch Security Study,” HP combined manual testing along with the use of digital tools and its HP Fortify on Demand methodology to evaluate 10 of what they believe to be today’s “top” gadgets. The team found many of the devices to be susceptible because they simply lacked basic, industry standard security measures. While the results may be disappointing, they are not too surprising given the latest string of hacks and breaches.

“Smartwatches have only just started to become a part of our lives, but they deliver a new level of functionality that could potentially open the door to new threats to sensitive information and activities,” explained Jason Schmitt, general manager of HP Security, Fortify. “As the adoption of smartwatches accelerates, the platform will become vastly more attractive to those who would abuse that access, making it critical that we take precautions when transmitting personal data or connecting smartwatches into corporate networks.”

Topping the list of flaws included insufficient verification, lack of encryption, insecure web interfaces and other privacy concerns. Not only did every tested unit lack a two-factor authentication process and the ability to lock out accounts after three to five failed password attempts, but the company flagged as many as 30% of the wearables to be vulnerable to account harvesting, a technique where an attacker could gain access to the device and data using a combination of weak password policy, lack of account lockout and user enumeration.

Security_Touch_SS_83000362

Additionally, researchers uncovered that the devices demonstrated a lack of transport encryption protocols. While each of them implemented encryption using SSL/TLS, 40% of the watches remained defenseless to known vulnerabilities such as POODLE, allowed the use of weak cyphers or still used SSL v2.

30% of the tested smartwatches used cloud-based web interfaces, all of which exhibited account enumeration concerns. In a separate study, three in 10 exhibited account enumeration concerns with their mobile applications as well. This flaw enables hackers to identify valid user accounts through feedback received from reset password mechanisms.

Making matters worse, 7 out of 10 gadgets analyzed are said to have problems with firmware updates. Researchers revealed that most of the smartwatches did not receive encrypted firmware updates, and while a number of updates were signed to help prevent malicious code or contaminated updates from being installed, a lack of encryption did allow files to be downloaded and looked at elsewhere.

If that all wasn’t scary enough, HP says the wearables demonstrate a risk to personal security and privacy ranging from names, addresses and date of births to weight, gender and heart rate information. Given the account enumeration issues and use of weak passwords on some products, exposure of this personal data is surely a concern.

“As manufacturers work to incorporate necessary security measures into smartwatches, consumers are urged to consider security when choosing to use a smartwatch. It’s recommended that users do not enable sensitive access control functions such as car or home access unless strong authorization is offered. In addition, enabling passcode functionality, ensuring strong passwords and instituting two-factor authentication will help prevent unauthorized access to data,” HP concludes.

Want to delve a bit deeper? Be sure to check out HP’s entire report, as well as explore ways to embed hardware-based security into future wearable designs.