http://en.wikipedia.org/wiki/Authentication Authenticating the battery belongs in the device: "Authentication devices range from simple identification features to secure= cryptographic products using an SHA-1 HMAC. " A counterfeit battery might be bad in these categories: "Portable medical Diagnostics, insulin pumps, heart rate monitors, blood glucose monitors Military Radio, night vision devices"=20 -----Original Message----- >From: Chris McSweeny >Sent: Nov 11, 2014 4:54 PM >To: "Microcontroller discussion list - Public." >Subject: Re: [EE]:: Securely encrypt your batteries with HMAC SHA-1 > >How reassuring. I often worry about people stealing data from my batteries= .. > >Seriously, what is the application for this? > > >Chris > >On Tue, Nov 11, 2014 at 10:41 PM, RussellMc wrote: > >> Cryptographically secure battery management ICs.. >> One way to ensure that the data in your batteries is kept safe. >> Or, to achieve other ends. >> >> >> http://www.ti.com/lsds/ti/power-management/battery-li-ion-protection-sol= utions-overview.page?DCMP=3Dtlead-power-bms-pwr-bms-gmap-batterysafety-en&H= QS=3Dtlead-power-bms-pwr-bms-gmap-batterysafety-bs-lp-en >> >> >> Russell >> -- >> http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive >> View/change your membership options at >> http://mailman.mit.edu/mailman/listinfo/piclist >> >--=20 >http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive >View/change your membership options at >http://mailman.mit.edu/mailman/listinfo/piclist --=20 http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .