EP2868032A2 - Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande - Google Patents

Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande

Info

Publication number
EP2868032A2
EP2868032A2 EP13753119.0A EP13753119A EP2868032A2 EP 2868032 A2 EP2868032 A2 EP 2868032A2 EP 13753119 A EP13753119 A EP 13753119A EP 2868032 A2 EP2868032 A2 EP 2868032A2
Authority
EP
European Patent Office
Prior art keywords
response
challenge
puf
authenticator
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP13753119.0A
Other languages
German (de)
English (en)
Inventor
Rainer Falk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Publication of EP2868032A2 publication Critical patent/EP2868032A2/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2121Chip on media, e.g. a disk or tape with a chip embedded in its case

Definitions

  • This invention relates to the technical field of checking authentication by means of a Physical Unclosable Function (PUF).
  • PAF Physical Unclosable Function
  • Authentication is a basic security mechanism.
  • a user or an object can be authenticated.
  • a functionality may e.g. an IC, a controller, software, or a service reachable via a network can be activated or deactivated, e.g. accessing certain memory areas, a configuration and diagnostic function (e.g., JTAG), or activation of a particular functionality (e.g., battery charging with currents above a threshold).
  • a functionality may e.g. an IC, a controller, software, or a service reachable via a network can be activated or deactivated, e.g. accessing certain memory areas, a configuration and diagnostic function (e.g., JTAG), or activation of a particular functionality (e.g., battery charging with currents above a threshold).
  • JTAG configuration and diagnostic function
  • a particular functionality e.g., battery charging with currents above a threshold.
  • Authentication can generally take place by means of a password or a cryptographic key or by means of biometric properties of a user (fingerprint,%) Or of a physical object (physical unclonable function).
  • the authenticated points to know a password, a cryptographic key, or to exhibit a certain property.
  • authentication by possession of an object is also known, e.g. by possession of a door key or a badge.
  • Device authentication eg of a semiconductor IC: A programmable logic device (in particular an FPGA) functions only or only without restriction if a specific hardware device (security IC) is detected as being present. This prevents simple copying of FPGA bitfiles because a copied bitfile is in a different hardware environment in which no or another security IC is available. is not workable there.
  • An example is http: // www. maxim- ic. com / app-notes / index. mvp / id / 3826
  • Semiconductor ICs as well as e.g. Controllers have diagnostic interfaces to access internal functions during development, manufacturing, or repair. Access to such functionality must be protected in regular operation if sensitive information is accessible (e.g., reading stored keys). It is known to disable such interfaces when they are no longer needed (by burning a so-called security fuse). It is also known
  • Physical Unclonable Functions are known to reliably identify objects based on their intrinsic physical properties.
  • a physical property of an object eg a semiconductor IC
  • Authentication of an object is based on the fact that, depending on a challenge value, a corresponding response value is returned by a PUF function defined by physical properties
  • Physical Unclonable Functions (PUF) provide a space-saving and thus cost-effective way of authenticating a physical object based on its intrinsic physical properties by adding a corresponding response value to a given challenge value by the PUF, depending on the object-specific physical properties of the object
  • An examiner who selects an object In the case of known ChallengeResponse pairs, a similarity comparison of the present and the response values provided by the authenticated object can identify the object as the original object.
  • PUF chip-internal determination of a cryptographic key by means of a PUF.
  • the determined cryptographic key is used within the chip for calculating a cryptographic operation.
  • the PUF raw data (response) generally still needs to be reworked to compensate for statistical variations in the PUF response to a particular challenge (e.g., by forward error correction or feature extraction, as in conventional fingerprint authentication).
  • http: // www. usenix. org / event / sec07 / tech / full_papers / alkabani / a lkabani.pdf is known to prevent the overbuilding of semiconductor ICs by means of a PUF by modifying the state machine needed to operate the IC to a large number
  • the start state is determined by means of a PUF, ie the IC starts execution in a start state dependent on random, instance-specific properties .Only the designer of the IC, who knows the design specification of the state machine, For example, for a particular IC, it may be practical to determine a path from the random initial state to a start state required for the use of the functionality, and thus to program a fabricated IC.
  • PUFs An advantage of PUFs is that a PUF structure is changed during a physical manipulation and thus tamper protection is achievable.
  • PUFs also applicable if a device does not have memory to permanently store a cryptographic key (this either requires special manufacturing processes, eg for flash memory, or a backup battery for SRAM memory cells).
  • PUF replenishment It is known as PUF replenishment that a PUF authentication server determines challenge-response pairs during operation and stores them for future authentication (check processes) (see http://ip.com/lPCOM/000127000).
  • authenticator also called examiner or authenticator
  • authentication object also called an authenticator, examinee, or supplicant
  • FIG. 1 shows an authentication system 80 according to the prior art.
  • the authentication check function 85 of a tester 83 selects a challenge c in the prior art and transmits it to the test object 82.
  • the test object 82 receives the challenge c and uses a PUF 86 of the test object 82 to determine a response value r.
  • the response value r becomes provided to the examiner 83. It determines here, by means of a list 87 of stored challenge-response pairs (CR pairs), whether the response r provided by the test object 82 is valid. This can be done, for example, by a similarity comparison of the response value r provided by the test object 82 with a reference response value stored for the challenge value c used.
  • CR pairs stored challenge-response pairs
  • a method for checking an authentication of an authentication object by means of an authenticator comprises a physical unclonable function, referred to below as PUF, and an authentication check function.
  • the authenticator is provided with a challenge-response pair.
  • the challenge-response pair comprises a challenge information, also called a challenge below, and a Response information, also called response below.
  • the response is provided to the authenticator by the authentication object.
  • the challenge information is used as input to the PUF.
  • the PUF generates a PUF response to the input of the challenge information.
  • the PUF response and response are used for comparison. Depending on a result of the comparison, a release signal is provided.
  • the invention relates to an authentication device for authenticating an authentication object.
  • the authenticator comprises a PUF, an authentication check function and a detection means for detecting a challenge-response pair.
  • the challenge-response pair comprises a challenge information and a response
  • the detection means is configured and / or adapted to receive the response information from the authentication object.
  • the authenticator is configured and / or adapted to transfer the response to the authentication check function, to use the challenge information sent by the authentication object as input for the PUF, and also to send a PUF response generated by the PUF to the authentication check function to hand over.
  • the authentication check function is configured and / or adapted to use the PUF response and the response for a comparison. The comparison provides an enabling signal depending on the result of the comparison.
  • the invention also relates to an authentication system which comprises the above-described authenticator and an authentication object, wherein the authentication object is configured and / or adapted to make the response available to the authenticator.
  • an authentication system which comprises the above-described authenticator and an authentication object, wherein the authentication object is configured and / or adapted to make the response available to the authenticator.
  • Figure 2 is a system for authenticating an authentication object based on its preferred embodiments of the invention will be explained below.
  • FIG. 2 shows an authentication system 1, which comprises an authentication object 2 and an electronic part 9.
  • the electronic part 9 comprises an authenticator 3, and the authentication object 2 comprises a memory area 7.
  • challenge-response pairs 4A, 4B, 4C are stored.
  • Each of the challenge-response pairs 4A, 4B, 4C comprises a challenge information C, C2, C3, hereinafter also called challenge value C, C2, C3, or simply challenge C, C2, C3, and one to one of the Challenge associated response information R, R2, R3, hereinafter also Ronse value R, R2, R3, or Response R, R2, R3, called.
  • the authenticator 3 comprises an authentication check function 5, a physical unclonable function 6, also referred to below as PUF 6, and a detection means 10 for detecting challenge-response pairs 4A, 4B, 4C.
  • a challenge-response pair 4A is made available to the authenticator.
  • the challenge-response pair 4A is sent to the authenticator 3 by the authentication object 2.
  • the authenticator 3 uses the challenge information C as an input for the PUF 6, which generates a PUF response PR on the input of the challenge information C.
  • the PUF response PR and the response R are used for a comparison, wherein a release signal A is provided depending on the result of the comparison.
  • the authentication object it is not necessary for the authentication object to be 2 stores the challenge-response pairs 4A, 4B, 4C. It can query these from a database, or calculate them by means of a calculation model of the PUF 6. Likewise, it is not necessary for the authentication object to provide the entire challenge / response pair 4A of the PUF. It is sufficient if the response R is provided by the authentication object 2 to the authenticator 3.
  • the challenge information C can also be selected by the authenticator 3 or by a third instance.
  • a match measure is determined in the context of the comparison.
  • the match score is compared to a threshold.
  • the enable signal A is provided if the determined measure of conformity reaches or exceeds the threshold value.
  • the Authent Deutschensobj ect 2 is therefore preferably designed and / or adapted to provide the authenticator 3 multiple Responses R, R2, R3 or Challenge-Response pairs 4A, 4B, 4C.
  • the electronic part 9 is designed and / or adapted to be either in an open or in a restricted state. the. In the restricted state, a function of the electronic part is not or only partially usable.
  • the enable signal A does not necessarily serve to limit a function of the electronic part 9, it can also be used to limit external functions, ie to limit the functions of other systems or components.
  • the authentication object 2 also provides PUF correction data that the authenticator 3 uses to verify the provided response R, R2, R3 and the PUF response PR, PR2, PR3, PRi generated by means of the PUF 6.
  • the detection means 10 is also designed and / or adapted to receive the PUF correction data from the authentication object (2).
  • identification information of the authentication object 2 is determined and dependent thereon is a cryptographic key for the encrypted transmission of responses R. , R2, R3, or for the encrypted transmission of challenge-response pairs 4A, 4B, 4C between the authenticator and the Authent Deutschensobj ect or see between an unlockable function and the authentication object 2 determines.
  • the communication could also take place between the unlockable function and the authenticated object (additional variant).
  • the authenticator 3 would determine a cryptographic key and provide the unlockable function.
  • the authenticator 3 depending on the challenge-response pair 4A provided to the authenticator 3 or depending on the challenge-response pairs 4A, 4B, 4C provided to the authenticator 3, the authenticator 3 generates a cryptographic key for the encrypted transmission of responses R, R2, R3, or for the encrypted transmission of challenge-response Pairs 4A, 4B, 4C between the authenticator 3 and the thentleitersobj ect 2 or between an unlockable function and the Authent confusesobj ect 2 determines.
  • the challenge values C, C2, C3 or the challenge-response pairs 4A, 4B, 4C are thus used directly to determine a key.
  • the identification information of the authentication object 2 can thus also be given by the challenge value or values C, C2, C3 or the challenge-response pair 4A, 4B, 4C (in addition to the customary variant that a user Name, a serial number or network address is used).
  • the authenticator 3 comprises a cryptographic means 11.
  • the authenticator 3 comprises a provisioning means 12 which is designed and / or adapted to provide further challenge-response pairs for future authentication after accepting the authentication object 2.
  • the inventive method comprises providing the Authent Deutschensobj ectes 2 and 3 of the authenticator.
  • associated response values can be determined by means of the physical unclonable function PUF for selectable challenge values.
  • PUF physical unclonable function
  • a PUF may be illustratively considered the "fingerprint" of a hardware object Hitherto, according to the prior art, a PUF may be used to identify the object by its "fuzzy" fingerprint. It is also known internally to determine a cryptographic key from PUF responses using error correction methods and stored correction data.
  • a physical unclonable function PUF of an object is now not used as in the prior art for calculating a response provided to an external entity for examination in the context of an object authentication but for checking a received response or a challenge Response pair through the object.
  • a PUF of an object for example of a semiconductor IC such as a memory module, an FPGA or ASIC, or a so-called system on chip SoC
  • the object itself can the PUF of the object to authenticate an outsider and depending on a certain function unlock (eg memory access to a specific memory area, execution / start of a realized by the IC control algorithm or a functionality, test / diagnostic interface of the ICs (eg JTAG interface)
  • Challenge-response pairs of a chip for future authentication processes can be detectable, for example, as long as the chip is in an open mode (eg security fuse not burned), so that they can be read out by an authorized user and stored in a database, for example - chert be, or it may possibly be determined a chip model, m with which the valid responses can be calculated for any challenge.
  • the chip can be "lured", eg by burning a fuse, after which access to protected functionality is only possible after a valid response value has been provided.
  • the PUF can be used in one variant, In other words, according to a preferred embodiment, the PUF 6 is used in a dual fashion, namely by the authenticator 3. The PUF 6 does not realize an authentication function in the role of the device under test here . but an authentication verification in the role of the examiner. This makes it possible to use a simple and inexpensive realizable PUF 6 now for a whole new purpose.
  • the PUF 6 is now used to test a provided Response R.
  • the test object 2 provides a charge-response pair C, R.
  • the response value R is stored here. If authentication is successful, the authentication check function 5 provides an Accept signal A. This may enable a function of the tester 3 (e.g., diagnostic interface, configuration mode, feature enable). In a variant (not shown) the test specimen 2 can be provided by the examiner 3 with a message about the success or failure.
  • a comparator 7 of the authenticator 3 checks the response R provided by the authenticated 2 and the (expected) response PR determined by the PUF 6 of the authenticator 3 for consistency (sufficient similarity).
  • the internal PUF 6 of the authenticator 3 may be polled multiple times for the same challenge information C to obtain multiple PUF responses PRi for a particular challenge information C.
  • the challenge value C can be selected by the authenticating object 2 (test object), by the authenticator 3 (examiner) or by a third party. It is possible to use an identical challenge information C, but preferably a plurality of changing challenge information C, C2, C3.
  • the test object 2 provides PUF correction data (helper data / fuzzy extractor parameters, eg parameters forward error correction) which the checker 3 uses to verify the provided response R and the response value PR determined by means of the physical PUF 6.
  • PUF correction data helper data / fuzzy extractor parameters, eg parameters forward error correction
  • the examiner 3 sets aside CR-
  • the correction data has a selectable parameter (e.g., a PIN or a password). This has the advantage that an authentication by means of a password,
  • the auditor 3 therefore does not have to store any check information, but instead can check a provided password by means of a PUF and provided data.
  • the tester 3 additionally provides correction data in addition to the CR pair or the response value R assigned to a specific challenge value C, wherein the response value R or the correction data is selected by a selectable parameter (PIN , Password) provided to the verifier 3.
  • the examinee 2 then stores only a CR pair or correction data, but not the password or the PIN.
  • the password or PIN first has to be provided to the device under test 2, eg by a user via an input option, so that the authentication data required for successful authentication can be available to the device under test 2 and thus made available to the tester 3.
  • the test object 2 can store CR pairs 4A, 4B, 4C of the authenticator 3, query from a database, or calculate the PUF 6 by means of a calculation model.
  • the (physical) PUF 6 is measured in an initialization phase in order to determine the model parameters. In both cases (CR pairs, model parameters), this data has been collected and stored at an earlier point in time, eg during the manufacture of the authenticator.
  • this query via a communication connection, eg via an IP / http connection.
  • a communication connection eg via an IP / http connection.
  • IPsec IP Security
  • SSL / TLS Secure Sockets Layer
  • the examinee 2 authenticates itself, for example, by means of a password or a cryptographic key with respect to the database server. Only if the device under test 2 is authorized to release a functionality on an examiner component, a CR pair is provided to it for activating the functionality of the database server.
  • a diagnostic interface JTAG, RS232, USB
  • certain functionality e.g., access to a memory area, use of a stored key
  • this functionality is unlocked. It can remain unlocked until a lock command is received, power is interrupted, or rebooted.
  • the described authentication can also be performed with further authentication methods, e.g. a conventional password check or a cryptographic challenge response
  • Authentication can be combined. Depending on the authentication variant used, a different functionality can be enabled. In another variant, several authentication must be passed successfully in order to enable a functionality of the auditor 3.
  • the CR pair 4A or the response value R which is transmitted to the verifier 3, is cryptographically encrypted.
  • the verifier 3 uses a stored cryptographic key to decrypt the received C-R pair 4A and the received response R, respectively.
  • the decrypted value is provided to the PUF 6 internally for review.
  • a given examinee 2 is thereby provided with C-R pairs 4A, 4B, 4C for later authentications tied to its identity. Another candidate with a different identity can not use these C-R pairs. This prevents easy copying of C-R pairs 4A, 4B, 4C and use by another device under test.
  • a later authentication of the test specimen by the examiner first his identity is detected and dependent on the key reconstructed in order to decrypt thus received by him C-R pairs or Responses.
  • the determination of the specimen-specific key may e.g. using a cryptographic Key Derivation Function (KDF), a cryptographic hash function.
  • KDF cryptographic Key Derivation Function
  • a DUT-specific key is derived from an unbound key (i.e., calculated by a one-way function).
  • the original key used can be fixed, configurable, or it can be determined from a PUF (identical or different to the authentication verification PUU).
  • an alternative to a password check is provided.
  • a password check the password or a password of the
  • Password dependent test parameters are stored. No memory is required, making it suitable for ICs that do not have the ability to store data permanently. Otherwise a memory would have to be provided (for example production-technically problematic) or
  • flammable fuses which also represent a memory
  • an SRAM backup battery can be provided (battery problematic), or an external EEPROM memory can be used (cost, interface vulnerable to EEPROM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne la vérification d'une authentification au moyen d'une fonction PUF (fonction physique non clonable) (6). Un dispositif d'authentification (3) comprend une fonction PUF (6) et une fonction de vérification d'authentification (5). Une paire défi-réponse (4A) comportant une information de défi (C) et une information de réponse (R) est préparée pour le dispositif d'authentification (3). L'information de défi (C) sert d'entrée pour la fonction PUF (6) qui génère, suite à l'entrée de l'information de défi (C), une réponse PUF (PR). La réponse PUF (PR) et la réponse (R) sont employées pour une comparaison en fonction d'un résultat de laquelle un signal de validation (A) est préparé.
EP13753119.0A 2012-10-19 2013-08-13 Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande Withdrawn EP2868032A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102012219112.7A DE102012219112A1 (de) 2012-10-19 2012-10-19 Verwenden einer PUF zur Prüfung einer Authentisierung, insbesondere zum Schutz vor unberechtigtem Zugriff auf eine Funktion eines ICs oder Steuergerätes
PCT/EP2013/066875 WO2014060134A2 (fr) 2012-10-19 2013-08-13 Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande

Publications (1)

Publication Number Publication Date
EP2868032A2 true EP2868032A2 (fr) 2015-05-06

Family

ID=49035536

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13753119.0A Withdrawn EP2868032A2 (fr) 2012-10-19 2013-08-13 Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande

Country Status (5)

Country Link
US (1) US20150269378A1 (fr)
EP (1) EP2868032A2 (fr)
CN (1) CN104782076A (fr)
DE (1) DE102012219112A1 (fr)
WO (1) WO2014060134A2 (fr)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9787480B2 (en) * 2013-08-23 2017-10-10 Qualcomm Incorporated Applying circuit delay-based physically unclonable functions (PUFs) for masking operation of memory-based PUFs to resist invasive and clone attacks
DE102014208210A1 (de) * 2014-04-30 2015-11-19 Siemens Aktiengesellschaft Ableiten eines gerätespezifischen Wertes
DE102014210282A1 (de) * 2014-05-30 2015-12-03 Siemens Aktiengesellschaft Erzeugen eines kryptographischen Schlüssels
KR102304927B1 (ko) * 2014-06-13 2021-09-24 삼성전자 주식회사 메모리 장치, 메모리 시스템 및 메모리 시스템의 동작 방법
JP2016111446A (ja) * 2014-12-03 2016-06-20 株式会社メガチップス メモリコントローラ、メモリコントローラの制御方法及びメモリシステム
JP6430847B2 (ja) * 2015-02-05 2018-11-28 株式会社メガチップス 半導体記憶装置
US10256983B1 (en) * 2015-03-25 2019-04-09 National Technology & Engineering Solutions Of Sandia, Llc Circuit that includes a physically unclonable function
CN105760786B (zh) * 2016-02-06 2019-05-28 中国科学院计算技术研究所 一种cpu+fpga集成芯片的强puf认证方法及系统
DE102016104771A1 (de) * 2016-03-15 2017-10-05 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Verfahren zum Erzeugen einer Authentifizierungsnachricht, Verfahren zum Authentifizieren, Authentifizierungsgerät und Authentifizierungsbasisgerät
US10235517B2 (en) * 2016-05-13 2019-03-19 Regents Of The University Of Minnesota Robust device authentication
CN106353619B (zh) * 2016-09-14 2019-02-12 电子科技大学 芯片防伪电路
US10185820B2 (en) * 2016-11-09 2019-01-22 Arizona Board Of Regents On Behalf Of Northern Arizona University PUF hardware arrangement for increased throughput
WO2018183572A1 (fr) * 2017-03-29 2018-10-04 Board Of Regents, The University Of Texas System Réduction de la quantité de données auxiliaires dans des fonctions physiques inclonables en silicium par l'intermédiaire d'une compression avec perte et sans caractérisation d'erreur pendant la production
WO2018198110A1 (fr) * 2017-04-25 2018-11-01 Ix-Den Ltd. Système et procédé d'authentification de dispositif ido et d'autorisation de transaction sécurisée
FR3068150B1 (fr) * 2017-06-21 2020-02-07 Commissariat A L'energie Atomique Et Aux Energies Alternatives Procede de securisation de maniere constructive d'un circuit integre lors de sa realisation
CN108199845B (zh) * 2017-12-08 2021-07-09 中国电子科技集团公司第三十研究所 一种基于puf的轻量级认证设备及认证方法
US10915635B2 (en) * 2017-12-22 2021-02-09 The Boeing Company Countermeasures to frequency alteration attacks on ring oscillator based physical unclonable functions
CN108921995A (zh) * 2018-07-03 2018-11-30 河海大学常州校区 基于物理不可克隆技术的rfid卡片式智能门锁
US12013259B2 (en) 2018-09-26 2024-06-18 Infineon Technologies Ag Providing compensation parameters for sensor integrated circuits
US11303462B2 (en) * 2018-11-19 2022-04-12 Arizona Board Of Regents On Behalf Of Northern Arizona University Unequally powered cryptography using physical unclonable functions
CN110049002B (zh) * 2019-03-01 2021-07-27 中国电子科技集团公司第三十研究所 一种基于PUF的IPSec认证方法
EP3771140B1 (fr) * 2019-07-23 2021-08-25 Nokia Technologies Oy Sécurisation d'une possession de ressource prouvable
CN110601854B (zh) * 2019-09-19 2023-07-14 许继集团有限公司 一种授权客户端、配电终端设备及其授权方法
US20240048540A1 (en) * 2020-12-24 2024-02-08 Beijing Boe Technology Development Co., Ltd. Interactive authentication method, system, computer device, and non-volatile readable storage medium
US11985259B2 (en) * 2021-06-24 2024-05-14 Raytheon Company Unified multi-die physical unclonable function
CN114584321B (zh) * 2022-03-21 2024-01-26 北京普安信科技有限公司 一种基于puf器件的数据信息加密部署方法
CN115694843B (zh) * 2022-12-29 2023-04-07 浙江宇视科技有限公司 避免仿冒的摄像机接入管理方法、系统、设备和介质

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7961885B2 (en) 2005-04-20 2011-06-14 Honeywell International Inc. Encrypted JTAG interface
JP2009533742A (ja) * 2006-04-11 2009-09-17 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ データベースなしのノイジーな低電力puf認証
EP2100263B1 (fr) * 2006-12-06 2010-10-20 Koninklijke Philips Electronics N.V. Contrôle de l'accès à des données vers et à partir d'un dispositif rfid
ATE544123T1 (de) 2007-09-19 2012-02-15 Verayo Inc Authentifizierung mit physikalisch unklonbaren funktionen
CN102077205B (zh) * 2008-06-27 2015-12-16 皇家飞利浦电子股份有限公司 用于检验物品的真实性、完整性和/或物理状态的设备、系统和方法
US8966660B2 (en) * 2008-08-07 2015-02-24 William Marsh Rice University Methods and systems of digital rights management for integrated circuits
EP2237183B1 (fr) * 2009-03-31 2013-05-15 Technische Universität München Procédé de sécurité
US8370787B2 (en) * 2009-08-25 2013-02-05 Empire Technology Development Llc Testing security of mapping functions
US8694778B2 (en) * 2010-11-19 2014-04-08 Nxp B.V. Enrollment of physically unclonable functions
DE102012217716A1 (de) * 2012-09-28 2014-06-12 Siemens Aktiengesellschaft Selbst-Test einer Physical Unclonable Function

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2014060134A2 *

Also Published As

Publication number Publication date
DE102012219112A1 (de) 2014-04-24
CN104782076A (zh) 2015-07-15
WO2014060134A3 (fr) 2014-07-10
WO2014060134A2 (fr) 2014-04-24
US20150269378A1 (en) 2015-09-24

Similar Documents

Publication Publication Date Title
EP2868032A2 (fr) Emploi d'une fonction puf pour la vérification d'une authentification, en particulier pour la protection contre un accès non autorisé à une fonction d'un ics ou d'un appareil de commande
EP3529736B1 (fr) Fourniture et contrôle de la validité d'un document virtuel
EP3474172B1 (fr) Contrôle d'accès à l'aide d'une chaîne de blocs
EP3057025B1 (fr) Procédé mis en oeuvre par ordinateur destiné au contrôle d'accès
EP3655880B1 (fr) Système matériel à chaîne de blocs
DE102014101495B4 (de) Verfahren zum Zugang zu einem physisch abgesicherten Rack sowie Computernetz-Infrastruktur
WO2018104276A1 (fr) Chaîne de blocs maîtresse
EP3246839B1 (fr) Contrôle d'accès comprenant un appareil radio mobile
EP2235598B1 (fr) Appareil de terrain et son procédé de fonctionnement
EP2272199B1 (fr) Dispositif de stockage de données réparti
EP3428830B1 (fr) Token d'identification au microcontrôleur securisé
DE102014210282A1 (de) Erzeugen eines kryptographischen Schlüssels
DE102018212098A1 (de) Verfahren zum Betrieb eines blockchainbasierten Produktschutzsystems und blockchainbasiertes Produktschutzsystem
WO2016041843A1 (fr) Procédé et agencement permettant d'autoriser une action au niveau d'un système en libre-service
DE102017006200A1 (de) Verfahren, Hardware und System zur dynamischen Datenübertragung an ein Blockchain Rechner Netzwerk zur Abspeicherung Persönlicher Daten um diese Teils wieder Blockweise als Grundlage zur End zu Endverschlüsselung verwendet werden um den Prozess der Datensammlung über das Datenübertragungsmodul weitere Daten in Echtzeit von Sensoreinheiten dynamisch aktualisiert werden. Die Blockmodule auf dem Blockchaindatenbanksystem sind unbegrenzt erweiterbar.
WO2011072952A1 (fr) Dispositif et procédé pour accorder des droits d'accès à une fonctionnalité de maintenance
DE102006021347B4 (de) Verfahren zur gerichtsverwertbaren Durchführung von Transaktionen
DE102016225354A1 (de) Nutzerauthentifizierung mit einer Mehrzahl von Merkmalen
EP3336736B1 (fr) Jeton auxiliaire id destiné à l'authentification mulifacteur
EP3036673B1 (fr) Procédé de commande d'accès à des données
EP1652131B1 (fr) Procede d'emission d'un support de donnees portable.
EP3552189A1 (fr) Puce-implant présentant une authentification à deux facteurs
EP3968291A1 (fr) Procédé d'autorisation d'utilisation, ainsi que dispositif d'autorisation de fonction correspondant

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20150130

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIEMENS AKTIENGESELLSCHAFT

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20180301