EP2868032A2 - Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande - Google Patents
Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commandeInfo
- Publication number
- EP2868032A2 EP2868032A2 EP13753119.0A EP13753119A EP2868032A2 EP 2868032 A2 EP2868032 A2 EP 2868032A2 EP 13753119 A EP13753119 A EP 13753119A EP 2868032 A2 EP2868032 A2 EP 2868032A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- response
- challenge
- puf
- authenticator
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2121—Chip on media, e.g. a disk or tape with a chip embedded in its case
Definitions
- This invention relates to the technical field of checking authentication by means of a Physical Unclosable Function (PUF).
- PAF Physical Unclosable Function
- Authentication is a basic security mechanism.
- a user or an object can be authenticated.
- a functionality may e.g. an IC, a controller, software, or a service reachable via a network can be activated or deactivated, e.g. accessing certain memory areas, a configuration and diagnostic function (e.g., JTAG), or activation of a particular functionality (e.g., battery charging with currents above a threshold).
- a functionality may e.g. an IC, a controller, software, or a service reachable via a network can be activated or deactivated, e.g. accessing certain memory areas, a configuration and diagnostic function (e.g., JTAG), or activation of a particular functionality (e.g., battery charging with currents above a threshold).
- JTAG configuration and diagnostic function
- a particular functionality e.g., battery charging with currents above a threshold.
- Authentication can generally take place by means of a password or a cryptographic key or by means of biometric properties of a user (fingerprint,%) Or of a physical object (physical unclonable function).
- the authenticated points to know a password, a cryptographic key, or to exhibit a certain property.
- authentication by possession of an object is also known, e.g. by possession of a door key or a badge.
- Device authentication eg of a semiconductor IC: A programmable logic device (in particular an FPGA) functions only or only without restriction if a specific hardware device (security IC) is detected as being present. This prevents simple copying of FPGA bitfiles because a copied bitfile is in a different hardware environment in which no or another security IC is available. is not workable there.
- An example is http: // www. maxim- ic. com / app-notes / index. mvp / id / 3826
- Semiconductor ICs as well as e.g. Controllers have diagnostic interfaces to access internal functions during development, manufacturing, or repair. Access to such functionality must be protected in regular operation if sensitive information is accessible (e.g., reading stored keys). It is known to disable such interfaces when they are no longer needed (by burning a so-called security fuse). It is also known
- Physical Unclonable Functions are known to reliably identify objects based on their intrinsic physical properties.
- a physical property of an object eg a semiconductor IC
- Authentication of an object is based on the fact that, depending on a challenge value, a corresponding response value is returned by a PUF function defined by physical properties
- Physical Unclonable Functions (PUF) provide a space-saving and thus cost-effective way of authenticating a physical object based on its intrinsic physical properties by adding a corresponding response value to a given challenge value by the PUF, depending on the object-specific physical properties of the object
- An examiner who selects an object In the case of known ChallengeResponse pairs, a similarity comparison of the present and the response values provided by the authenticated object can identify the object as the original object.
- PUF chip-internal determination of a cryptographic key by means of a PUF.
- the determined cryptographic key is used within the chip for calculating a cryptographic operation.
- the PUF raw data (response) generally still needs to be reworked to compensate for statistical variations in the PUF response to a particular challenge (e.g., by forward error correction or feature extraction, as in conventional fingerprint authentication).
- http: // www. usenix. org / event / sec07 / tech / full_papers / alkabani / a lkabani.pdf is known to prevent the overbuilding of semiconductor ICs by means of a PUF by modifying the state machine needed to operate the IC to a large number
- the start state is determined by means of a PUF, ie the IC starts execution in a start state dependent on random, instance-specific properties .Only the designer of the IC, who knows the design specification of the state machine, For example, for a particular IC, it may be practical to determine a path from the random initial state to a start state required for the use of the functionality, and thus to program a fabricated IC.
- PUFs An advantage of PUFs is that a PUF structure is changed during a physical manipulation and thus tamper protection is achievable.
- PUFs also applicable if a device does not have memory to permanently store a cryptographic key (this either requires special manufacturing processes, eg for flash memory, or a backup battery for SRAM memory cells).
- PUF replenishment It is known as PUF replenishment that a PUF authentication server determines challenge-response pairs during operation and stores them for future authentication (check processes) (see http://ip.com/lPCOM/000127000).
- authenticator also called examiner or authenticator
- authentication object also called an authenticator, examinee, or supplicant
- FIG. 1 shows an authentication system 80 according to the prior art.
- the authentication check function 85 of a tester 83 selects a challenge c in the prior art and transmits it to the test object 82.
- the test object 82 receives the challenge c and uses a PUF 86 of the test object 82 to determine a response value r.
- the response value r becomes provided to the examiner 83. It determines here, by means of a list 87 of stored challenge-response pairs (CR pairs), whether the response r provided by the test object 82 is valid. This can be done, for example, by a similarity comparison of the response value r provided by the test object 82 with a reference response value stored for the challenge value c used.
- CR pairs stored challenge-response pairs
- a method for checking an authentication of an authentication object by means of an authenticator comprises a physical unclonable function, referred to below as PUF, and an authentication check function.
- the authenticator is provided with a challenge-response pair.
- the challenge-response pair comprises a challenge information, also called a challenge below, and a Response information, also called response below.
- the response is provided to the authenticator by the authentication object.
- the challenge information is used as input to the PUF.
- the PUF generates a PUF response to the input of the challenge information.
- the PUF response and response are used for comparison. Depending on a result of the comparison, a release signal is provided.
- the invention relates to an authentication device for authenticating an authentication object.
- the authenticator comprises a PUF, an authentication check function and a detection means for detecting a challenge-response pair.
- the challenge-response pair comprises a challenge information and a response
- the detection means is configured and / or adapted to receive the response information from the authentication object.
- the authenticator is configured and / or adapted to transfer the response to the authentication check function, to use the challenge information sent by the authentication object as input for the PUF, and also to send a PUF response generated by the PUF to the authentication check function to hand over.
- the authentication check function is configured and / or adapted to use the PUF response and the response for a comparison. The comparison provides an enabling signal depending on the result of the comparison.
- the invention also relates to an authentication system which comprises the above-described authenticator and an authentication object, wherein the authentication object is configured and / or adapted to make the response available to the authenticator.
- an authentication system which comprises the above-described authenticator and an authentication object, wherein the authentication object is configured and / or adapted to make the response available to the authenticator.
- Figure 2 is a system for authenticating an authentication object based on its preferred embodiments of the invention will be explained below.
- FIG. 2 shows an authentication system 1, which comprises an authentication object 2 and an electronic part 9.
- the electronic part 9 comprises an authenticator 3, and the authentication object 2 comprises a memory area 7.
- challenge-response pairs 4A, 4B, 4C are stored.
- Each of the challenge-response pairs 4A, 4B, 4C comprises a challenge information C, C2, C3, hereinafter also called challenge value C, C2, C3, or simply challenge C, C2, C3, and one to one of the Challenge associated response information R, R2, R3, hereinafter also Ronse value R, R2, R3, or Response R, R2, R3, called.
- the authenticator 3 comprises an authentication check function 5, a physical unclonable function 6, also referred to below as PUF 6, and a detection means 10 for detecting challenge-response pairs 4A, 4B, 4C.
- a challenge-response pair 4A is made available to the authenticator.
- the challenge-response pair 4A is sent to the authenticator 3 by the authentication object 2.
- the authenticator 3 uses the challenge information C as an input for the PUF 6, which generates a PUF response PR on the input of the challenge information C.
- the PUF response PR and the response R are used for a comparison, wherein a release signal A is provided depending on the result of the comparison.
- the authentication object it is not necessary for the authentication object to be 2 stores the challenge-response pairs 4A, 4B, 4C. It can query these from a database, or calculate them by means of a calculation model of the PUF 6. Likewise, it is not necessary for the authentication object to provide the entire challenge / response pair 4A of the PUF. It is sufficient if the response R is provided by the authentication object 2 to the authenticator 3.
- the challenge information C can also be selected by the authenticator 3 or by a third instance.
- a match measure is determined in the context of the comparison.
- the match score is compared to a threshold.
- the enable signal A is provided if the determined measure of conformity reaches or exceeds the threshold value.
- the Authent Deutschensobj ect 2 is therefore preferably designed and / or adapted to provide the authenticator 3 multiple Responses R, R2, R3 or Challenge-Response pairs 4A, 4B, 4C.
- the electronic part 9 is designed and / or adapted to be either in an open or in a restricted state. the. In the restricted state, a function of the electronic part is not or only partially usable.
- the enable signal A does not necessarily serve to limit a function of the electronic part 9, it can also be used to limit external functions, ie to limit the functions of other systems or components.
- the authentication object 2 also provides PUF correction data that the authenticator 3 uses to verify the provided response R, R2, R3 and the PUF response PR, PR2, PR3, PRi generated by means of the PUF 6.
- the detection means 10 is also designed and / or adapted to receive the PUF correction data from the authentication object (2).
- identification information of the authentication object 2 is determined and dependent thereon is a cryptographic key for the encrypted transmission of responses R. , R2, R3, or for the encrypted transmission of challenge-response pairs 4A, 4B, 4C between the authenticator and the Authent Deutschensobj ect or see between an unlockable function and the authentication object 2 determines.
- the communication could also take place between the unlockable function and the authenticated object (additional variant).
- the authenticator 3 would determine a cryptographic key and provide the unlockable function.
- the authenticator 3 depending on the challenge-response pair 4A provided to the authenticator 3 or depending on the challenge-response pairs 4A, 4B, 4C provided to the authenticator 3, the authenticator 3 generates a cryptographic key for the encrypted transmission of responses R, R2, R3, or for the encrypted transmission of challenge-response Pairs 4A, 4B, 4C between the authenticator 3 and the thentleitersobj ect 2 or between an unlockable function and the Authent confusesobj ect 2 determines.
- the challenge values C, C2, C3 or the challenge-response pairs 4A, 4B, 4C are thus used directly to determine a key.
- the identification information of the authentication object 2 can thus also be given by the challenge value or values C, C2, C3 or the challenge-response pair 4A, 4B, 4C (in addition to the customary variant that a user Name, a serial number or network address is used).
- the authenticator 3 comprises a cryptographic means 11.
- the authenticator 3 comprises a provisioning means 12 which is designed and / or adapted to provide further challenge-response pairs for future authentication after accepting the authentication object 2.
- the inventive method comprises providing the Authent Deutschensobj ectes 2 and 3 of the authenticator.
- associated response values can be determined by means of the physical unclonable function PUF for selectable challenge values.
- PUF physical unclonable function
- a PUF may be illustratively considered the "fingerprint" of a hardware object Hitherto, according to the prior art, a PUF may be used to identify the object by its "fuzzy" fingerprint. It is also known internally to determine a cryptographic key from PUF responses using error correction methods and stored correction data.
- a physical unclonable function PUF of an object is now not used as in the prior art for calculating a response provided to an external entity for examination in the context of an object authentication but for checking a received response or a challenge Response pair through the object.
- a PUF of an object for example of a semiconductor IC such as a memory module, an FPGA or ASIC, or a so-called system on chip SoC
- the object itself can the PUF of the object to authenticate an outsider and depending on a certain function unlock (eg memory access to a specific memory area, execution / start of a realized by the IC control algorithm or a functionality, test / diagnostic interface of the ICs (eg JTAG interface)
- Challenge-response pairs of a chip for future authentication processes can be detectable, for example, as long as the chip is in an open mode (eg security fuse not burned), so that they can be read out by an authorized user and stored in a database, for example - chert be, or it may possibly be determined a chip model, m with which the valid responses can be calculated for any challenge.
- the chip can be "lured", eg by burning a fuse, after which access to protected functionality is only possible after a valid response value has been provided.
- the PUF can be used in one variant, In other words, according to a preferred embodiment, the PUF 6 is used in a dual fashion, namely by the authenticator 3. The PUF 6 does not realize an authentication function in the role of the device under test here . but an authentication verification in the role of the examiner. This makes it possible to use a simple and inexpensive realizable PUF 6 now for a whole new purpose.
- the PUF 6 is now used to test a provided Response R.
- the test object 2 provides a charge-response pair C, R.
- the response value R is stored here. If authentication is successful, the authentication check function 5 provides an Accept signal A. This may enable a function of the tester 3 (e.g., diagnostic interface, configuration mode, feature enable). In a variant (not shown) the test specimen 2 can be provided by the examiner 3 with a message about the success or failure.
- a comparator 7 of the authenticator 3 checks the response R provided by the authenticated 2 and the (expected) response PR determined by the PUF 6 of the authenticator 3 for consistency (sufficient similarity).
- the internal PUF 6 of the authenticator 3 may be polled multiple times for the same challenge information C to obtain multiple PUF responses PRi for a particular challenge information C.
- the challenge value C can be selected by the authenticating object 2 (test object), by the authenticator 3 (examiner) or by a third party. It is possible to use an identical challenge information C, but preferably a plurality of changing challenge information C, C2, C3.
- the test object 2 provides PUF correction data (helper data / fuzzy extractor parameters, eg parameters forward error correction) which the checker 3 uses to verify the provided response R and the response value PR determined by means of the physical PUF 6.
- PUF correction data helper data / fuzzy extractor parameters, eg parameters forward error correction
- the examiner 3 sets aside CR-
- the correction data has a selectable parameter (e.g., a PIN or a password). This has the advantage that an authentication by means of a password,
- the auditor 3 therefore does not have to store any check information, but instead can check a provided password by means of a PUF and provided data.
- the tester 3 additionally provides correction data in addition to the CR pair or the response value R assigned to a specific challenge value C, wherein the response value R or the correction data is selected by a selectable parameter (PIN , Password) provided to the verifier 3.
- the examinee 2 then stores only a CR pair or correction data, but not the password or the PIN.
- the password or PIN first has to be provided to the device under test 2, eg by a user via an input option, so that the authentication data required for successful authentication can be available to the device under test 2 and thus made available to the tester 3.
- the test object 2 can store CR pairs 4A, 4B, 4C of the authenticator 3, query from a database, or calculate the PUF 6 by means of a calculation model.
- the (physical) PUF 6 is measured in an initialization phase in order to determine the model parameters. In both cases (CR pairs, model parameters), this data has been collected and stored at an earlier point in time, eg during the manufacture of the authenticator.
- this query via a communication connection, eg via an IP / http connection.
- a communication connection eg via an IP / http connection.
- IPsec IP Security
- SSL / TLS Secure Sockets Layer
- the examinee 2 authenticates itself, for example, by means of a password or a cryptographic key with respect to the database server. Only if the device under test 2 is authorized to release a functionality on an examiner component, a CR pair is provided to it for activating the functionality of the database server.
- a diagnostic interface JTAG, RS232, USB
- certain functionality e.g., access to a memory area, use of a stored key
- this functionality is unlocked. It can remain unlocked until a lock command is received, power is interrupted, or rebooted.
- the described authentication can also be performed with further authentication methods, e.g. a conventional password check or a cryptographic challenge response
- Authentication can be combined. Depending on the authentication variant used, a different functionality can be enabled. In another variant, several authentication must be passed successfully in order to enable a functionality of the auditor 3.
- the CR pair 4A or the response value R which is transmitted to the verifier 3, is cryptographically encrypted.
- the verifier 3 uses a stored cryptographic key to decrypt the received C-R pair 4A and the received response R, respectively.
- the decrypted value is provided to the PUF 6 internally for review.
- a given examinee 2 is thereby provided with C-R pairs 4A, 4B, 4C for later authentications tied to its identity. Another candidate with a different identity can not use these C-R pairs. This prevents easy copying of C-R pairs 4A, 4B, 4C and use by another device under test.
- a later authentication of the test specimen by the examiner first his identity is detected and dependent on the key reconstructed in order to decrypt thus received by him C-R pairs or Responses.
- the determination of the specimen-specific key may e.g. using a cryptographic Key Derivation Function (KDF), a cryptographic hash function.
- KDF cryptographic Key Derivation Function
- a DUT-specific key is derived from an unbound key (i.e., calculated by a one-way function).
- the original key used can be fixed, configurable, or it can be determined from a PUF (identical or different to the authentication verification PUU).
- an alternative to a password check is provided.
- a password check the password or a password of the
- Password dependent test parameters are stored. No memory is required, making it suitable for ICs that do not have the ability to store data permanently. Otherwise a memory would have to be provided (for example production-technically problematic) or
- flammable fuses which also represent a memory
- an SRAM backup battery can be provided (battery problematic), or an external EEPROM memory can be used (cost, interface vulnerable to EEPROM).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne la vérification d'une authentification au moyen d'une fonction PUF (fonction physique non clonable) (6). Un dispositif d'authentification (3) comprend une fonction PUF (6) et une fonction de vérification d'authentification (5). Une paire défi-réponse (4A) comportant une information de défi (C) et une information de réponse (R) est préparée pour le dispositif d'authentification (3). L'information de défi (C) sert d'entrée pour la fonction PUF (6) qui génère, suite à l'entrée de l'information de défi (C), une réponse PUF (PR). La réponse PUF (PR) et la réponse (R) sont employées pour une comparaison en fonction d'un résultat de laquelle un signal de validation (A) est préparé.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102012219112.7A DE102012219112A1 (de) | 2012-10-19 | 2012-10-19 | Verwenden einer PUF zur Prüfung einer Authentisierung, insbesondere zum Schutz vor unberechtigtem Zugriff auf eine Funktion eines ICs oder Steuergerätes |
| PCT/EP2013/066875 WO2014060134A2 (fr) | 2012-10-19 | 2013-08-13 | Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP2868032A2 true EP2868032A2 (fr) | 2015-05-06 |
Family
ID=49035536
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP13753119.0A Withdrawn EP2868032A2 (fr) | 2012-10-19 | 2013-08-13 | Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20150269378A1 (fr) |
| EP (1) | EP2868032A2 (fr) |
| CN (1) | CN104782076A (fr) |
| DE (1) | DE102012219112A1 (fr) |
| WO (1) | WO2014060134A2 (fr) |
Families Citing this family (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9787480B2 (en) * | 2013-08-23 | 2017-10-10 | Qualcomm Incorporated | Applying circuit delay-based physically unclonable functions (PUFs) for masking operation of memory-based PUFs to resist invasive and clone attacks |
| DE102014208210A1 (de) * | 2014-04-30 | 2015-11-19 | Siemens Aktiengesellschaft | Ableiten eines gerätespezifischen Wertes |
| DE102014210282A1 (de) * | 2014-05-30 | 2015-12-03 | Siemens Aktiengesellschaft | Erzeugen eines kryptographischen Schlüssels |
| KR102304927B1 (ko) * | 2014-06-13 | 2021-09-24 | 삼성전자 주식회사 | 메모리 장치, 메모리 시스템 및 메모리 시스템의 동작 방법 |
| JP2016111446A (ja) * | 2014-12-03 | 2016-06-20 | 株式会社メガチップス | メモリコントローラ、メモリコントローラの制御方法及びメモリシステム |
| JP6430847B2 (ja) * | 2015-02-05 | 2018-11-28 | 株式会社メガチップス | 半導体記憶装置 |
| US10256983B1 (en) * | 2015-03-25 | 2019-04-09 | National Technology & Engineering Solutions Of Sandia, Llc | Circuit that includes a physically unclonable function |
| CN105760786B (zh) * | 2016-02-06 | 2019-05-28 | 中国科学院计算技术研究所 | 一种cpu+fpga集成芯片的强puf认证方法及系统 |
| DE102016104771A1 (de) * | 2016-03-15 | 2017-10-05 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Verfahren zum Erzeugen einer Authentifizierungsnachricht, Verfahren zum Authentifizieren, Authentifizierungsgerät und Authentifizierungsbasisgerät |
| US10235517B2 (en) * | 2016-05-13 | 2019-03-19 | Regents Of The University Of Minnesota | Robust device authentication |
| CN106353619B (zh) * | 2016-09-14 | 2019-02-12 | 电子科技大学 | 芯片防伪电路 |
| US10185820B2 (en) * | 2016-11-09 | 2019-01-22 | Arizona Board Of Regents On Behalf Of Northern Arizona University | PUF hardware arrangement for increased throughput |
| WO2018183572A1 (fr) * | 2017-03-29 | 2018-10-04 | Board Of Regents, The University Of Texas System | Réduction de la quantité de données auxiliaires dans des fonctions physiques inclonables en silicium par l'intermédiaire d'une compression avec perte et sans caractérisation d'erreur pendant la production |
| US20200082397A1 (en) * | 2017-04-25 | 2020-03-12 | Ix-Den Ltd. | System and method for iot device authentication and secure transaction authorization |
| FR3068150B1 (fr) * | 2017-06-21 | 2020-02-07 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | Procede de securisation de maniere constructive d'un circuit integre lors de sa realisation |
| CN108199845B (zh) * | 2017-12-08 | 2021-07-09 | 中国电子科技集团公司第三十研究所 | 一种基于puf的轻量级认证设备及认证方法 |
| US10915635B2 (en) * | 2017-12-22 | 2021-02-09 | The Boeing Company | Countermeasures to frequency alteration attacks on ring oscillator based physical unclonable functions |
| CN108921995A (zh) * | 2018-07-03 | 2018-11-30 | 河海大学常州校区 | 基于物理不可克隆技术的rfid卡片式智能门锁 |
| US12013259B2 (en) * | 2018-09-26 | 2024-06-18 | Infineon Technologies Ag | Providing compensation parameters for sensor integrated circuits |
| US11303462B2 (en) * | 2018-11-19 | 2022-04-12 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Unequally powered cryptography using physical unclonable functions |
| CN110049002B (zh) * | 2019-03-01 | 2021-07-27 | 中国电子科技集团公司第三十研究所 | 一种基于PUF的IPSec认证方法 |
| EP3771140B1 (fr) | 2019-07-23 | 2021-08-25 | Nokia Technologies Oy | Sécurisation d'une possession de ressource prouvable |
| CN110601854B (zh) * | 2019-09-19 | 2023-07-14 | 许继集团有限公司 | 一种授权客户端、配电终端设备及其授权方法 |
| US12470531B2 (en) | 2020-12-24 | 2025-11-11 | Beijing Boe Technology Development Co., Ltd. | Interactive authentication method, system, computer device, and non-volatile readable storage medium |
| US11985259B2 (en) * | 2021-06-24 | 2024-05-14 | Raytheon Company | Unified multi-die physical unclonable function |
| CN114584321B (zh) * | 2022-03-21 | 2024-01-26 | 北京普安信科技有限公司 | 一种基于puf器件的数据信息加密部署方法 |
| CN115694843B (zh) * | 2022-12-29 | 2023-04-07 | 浙江宇视科技有限公司 | 避免仿冒的摄像机接入管理方法、系统、设备和介质 |
| CN117034243A (zh) * | 2023-08-09 | 2023-11-10 | 中国银联股份有限公司 | 终端设备真实性的检测方法、装置、设备、系统及介质 |
| CN120602103B (zh) * | 2025-08-04 | 2025-10-24 | 中国电信股份有限公司 | 身份认证方法及相关设备 |
| CN121030721A (zh) * | 2025-10-29 | 2025-11-28 | 合肥晶合集成电路股份有限公司 | 晶圆信息加密认证方法、系统、服务器和存储介质 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7961885B2 (en) | 2005-04-20 | 2011-06-14 | Honeywell International Inc. | Encrypted JTAG interface |
| CN101422015A (zh) * | 2006-04-11 | 2009-04-29 | 皇家飞利浦电子股份有限公司 | 无需数据库的噪声低功率puf认证 |
| EP2100263B1 (fr) * | 2006-12-06 | 2010-10-20 | Koninklijke Philips Electronics N.V. | Contrôle de l'accès à des données vers et à partir d'un dispositif rfid |
| EP2214117B1 (fr) | 2007-09-19 | 2012-02-01 | Verayo, Inc. | Authentification avec fonctions physiques inclonables |
| CN102077205B (zh) * | 2008-06-27 | 2015-12-16 | 皇家飞利浦电子股份有限公司 | 用于检验物品的真实性、完整性和/或物理状态的设备、系统和方法 |
| US8966660B2 (en) * | 2008-08-07 | 2015-02-24 | William Marsh Rice University | Methods and systems of digital rights management for integrated circuits |
| EP2237183B1 (fr) * | 2009-03-31 | 2013-05-15 | Technische Universität München | Procédé de sécurité |
| US8370787B2 (en) * | 2009-08-25 | 2013-02-05 | Empire Technology Development Llc | Testing security of mapping functions |
| US8694778B2 (en) * | 2010-11-19 | 2014-04-08 | Nxp B.V. | Enrollment of physically unclonable functions |
| DE102012217716A1 (de) * | 2012-09-28 | 2014-06-12 | Siemens Aktiengesellschaft | Selbst-Test einer Physical Unclonable Function |
-
2012
- 2012-10-19 DE DE102012219112.7A patent/DE102012219112A1/de not_active Withdrawn
-
2013
- 2013-08-13 WO PCT/EP2013/066875 patent/WO2014060134A2/fr not_active Ceased
- 2013-08-13 US US14/435,584 patent/US20150269378A1/en not_active Abandoned
- 2013-08-13 EP EP13753119.0A patent/EP2868032A2/fr not_active Withdrawn
- 2013-08-13 CN CN201380054634.9A patent/CN104782076A/zh active Pending
Non-Patent Citations (1)
| Title |
|---|
| See references of WO2014060134A2 * |
Also Published As
| Publication number | Publication date |
|---|---|
| DE102012219112A1 (de) | 2014-04-24 |
| US20150269378A1 (en) | 2015-09-24 |
| WO2014060134A2 (fr) | 2014-04-24 |
| WO2014060134A3 (fr) | 2014-07-10 |
| CN104782076A (zh) | 2015-07-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2868032A2 (fr) | Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande | |
| EP3529736B1 (fr) | Fourniture et contrôle de la validité d'un document virtuel | |
| EP3474172B1 (fr) | Contrôle d'accès à l'aide d'une chaîne de blocs | |
| EP3655880B1 (fr) | Système matériel à chaîne de blocs | |
| EP3057025B1 (fr) | Procédé mis en oeuvre par ordinateur destiné au contrôle d'accès | |
| DE102014101495B4 (de) | Verfahren zum Zugang zu einem physisch abgesicherten Rack sowie Computernetz-Infrastruktur | |
| EP3246839B1 (fr) | Contrôle d'accès comprenant un appareil radio mobile | |
| WO2018104276A1 (fr) | Chaîne de blocs maîtresse | |
| EP4179487A1 (fr) | Procédé, unité participante, registre de transaction et système de paiement pour gérer des ensembles de données de transaction | |
| EP2272199B1 (fr) | Dispositif de stockage de données réparti | |
| EP2235598A1 (fr) | Appareil de terrain et son procédé de fonctionnement | |
| EP3428830B1 (fr) | Token d'identification au microcontrôleur securisé | |
| DE102014210282A1 (de) | Erzeugen eines kryptographischen Schlüssels | |
| WO2016041843A1 (fr) | Procédé et agencement permettant d'autoriser une action au niveau d'un système en libre-service | |
| DE102018212098A1 (de) | Verfahren zum Betrieb eines blockchainbasierten Produktschutzsystems und blockchainbasiertes Produktschutzsystem | |
| DE102017006200A1 (de) | Verfahren, Hardware und System zur dynamischen Datenübertragung an ein Blockchain Rechner Netzwerk zur Abspeicherung Persönlicher Daten um diese Teils wieder Blockweise als Grundlage zur End zu Endverschlüsselung verwendet werden um den Prozess der Datensammlung über das Datenübertragungsmodul weitere Daten in Echtzeit von Sensoreinheiten dynamisch aktualisiert werden. Die Blockmodule auf dem Blockchaindatenbanksystem sind unbegrenzt erweiterbar. | |
| EP3336736B1 (fr) | Jeton auxiliaire id destiné à l'authentification mulifacteur | |
| WO2011072952A1 (fr) | Dispositif et procédé pour accorder des droits d'accès à une fonctionnalité de maintenance | |
| DE102016225354A1 (de) | Nutzerauthentifizierung mit einer Mehrzahl von Merkmalen | |
| DE102006021347B4 (de) | Verfahren zur gerichtsverwertbaren Durchführung von Transaktionen | |
| EP1652131B1 (fr) | Procede d'emission d'un support de donnees portable. | |
| EP3036673B1 (fr) | Procédé de commande d'accès à des données | |
| WO2018103791A1 (fr) | Puce-implant présentant une authentification à deux facteurs |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20150130 |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| AX | Request for extension of the european patent |
Extension state: BA ME |
|
| DAX | Request for extension of the european patent (deleted) | ||
| RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIEMENS AKTIENGESELLSCHAFT |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20180301 |