EP3593274A1 - Procédés et système de marquage et de détection d'une unité physique résistante aux clones - Google Patents

Procédés et système de marquage et de détection d'une unité physique résistante aux clones

Info

Publication number
EP3593274A1
EP3593274A1 EP17721458.2A EP17721458A EP3593274A1 EP 3593274 A1 EP3593274 A1 EP 3593274A1 EP 17721458 A EP17721458 A EP 17721458A EP 3593274 A1 EP3593274 A1 EP 3593274A1
Authority
EP
European Patent Office
Prior art keywords
unit
response
electronic unit
challenge
physical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP17721458.2A
Other languages
German (de)
English (en)
Inventor
Wael Adi
Souher ALDROUBI
Peter Meinlschmidt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
Technische Universitaet Braunschweig
Original Assignee
Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
Technische Universitaet Braunschweig
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV, Technische Universitaet Braunschweig filed Critical Fraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
Publication of EP3593274A1 publication Critical patent/EP3593274A1/fr
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/217Validation; Performance evaluation; Active pattern learning techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]

Definitions

  • a technology for fabricating and identifying clone-resistant physical units is proposed.
  • Several possible applications in emerging interconnected environment, smart-homes and smart-cities are illustrated.
  • Possible concepts for realization technologies to approach a DNA-like structure identity are proposed.
  • the targeted outcomes are expected to exhibit novel low-cost fabrication technologies towards clone-resistant physical units and building structures for emerging near future applications.
  • the invention is related to the field of labeling and identifying a physical unit and to a system being able to carry out the methods.
  • the invention is related also to allowing carrying out re-identifying protocols and methods.
  • a particular information revolution took place, integrating all modern life infrastructures together by the increasing ability of items to communicate with each other, the so called Internet of Things (loT).
  • the emerging mass amount of integration information systems in all life environment and transactions raises exceedingly the question of how to securely identify entities by automated means in a networked world of information and physical entities whatever and wherever they are located. It has always been difficult to identify physical units properly. Stones where engraved by stone masons to label them to be deployed and as for the basis of payment.
  • unclonable or “clone-resistant” physical units, building structures or components would become an essential requirement, especially in the near future smart-homes, smart-city or smart-production environment.
  • a plenty of enhanced surveillance, safety and security applications in emerging smart environment linked to electronic government or electronic management are expected to be possible or feasible only when such unclonable or clone-resistant units do exist.
  • An unclonable identity is a very essential requirement to establish a secure communication in the internet of things environment, because any measurement values or any communication with an entity can be totally worthless or misleading if the entity is not identified securely.
  • the method for labeling a physical unit comprises the steps of providing at least one electronic unit working on a challenge-response principal as an identification protocol.
  • the electronic unit is provided with a secret digital secret unknown function with the particular capabilities to encipher/decipher (a Secret Unknown Cipher SUC) data or deliver huge sequences of data which is impossible to clone, model, simulate or store (Secret Unknown Hash Function SUHF) and a transceiver to communicate information in both directions.
  • the electronic unit is provided with a data storage and a transmitter.
  • the "response” is a joint combination of contributions from both said electronic unit and physical structure.
  • the transmitter After receiving a challenge, the transmitter provides a response signal as a reaction to the specific challenge.
  • the response signal is created by the electronic unit on a one on one-assignment of a specific challenge to a specific response.
  • a number of different responses were stored in the data storage of the at least one electronic unit, providing a DNA-like provable identity for the physical structure, e. g. in building constructions, in automobile industry, in any special construction, and in other parts, items, units or constructions.
  • Each response is assigned to a specific challenge, which has to be transmitted to the at least one electronic unit for receiving a response.
  • the electronic unit is undetachably connected to the physical unit during a manufacturing process of the physical unit.
  • To undetachably connect the electronic unit to the physical unit means that the electronic unit cannot be removed from the physical unit without damaging or destroying the electronic unit or without damaging or altering the identity-profile and the structural integrity of the physical unit.
  • the electronic unit can be embedded and/or injected in the physical unit such that the electronic unit is surrounded, preferably completely surrounded by the physical unit, for example within the material of building element, automotive part, machine part, machine tool, artefact or other similar structures.
  • a method for labeling a physical unit comprises the step of providing the electronic unit with a transceiver, connecting the transceiver with the secret function storage of the electronic unit and retrieving responses from both the joint secret function storage and the structure properties response.
  • the retrieved "Structronic-Responses” are stored securely in a secret data storage by the trusted verifier (TV).
  • the TV can securely re-identify a unit by challenging it by a randomly selected challenge expecting, when the unit is authentic to deliver the correct corresponding response SR. Any selected SR should be used just once in the lifetime of the structure for ultimate security.
  • a method for labeling a physical unit comprises the step of providing the electronic unit with a receiver, connecting the receiver with the data storage of the electronic unit and filing responses in the data storage after connecting the electronic unit with the physical unit.
  • filing responses in the data storage after connecting the electronic unit with the physical unit it is possible to implement the electronic or to connect the electronic unit with the physical unit at a location separate from the data transfer and by this from the individualization of the physical unit with the filed data.
  • splitting the location of manufacturing and individualization it is possible to securely identify the respective units by the manufacturer or by a certified authority before leaving the manufacturer or before delivery to the customer.
  • more than 1000 responses preferably more than 100000 responses are filed in the storage for creating an electronic identity to provide an unclonable or quasi-unclonable physical unit, because it is almost impossible or very unlikely that with such a number of responses an attacker or counterfeiter would be able to provide by accident exactly one of the correct secret challenge - response pairs.
  • the method comprises the step of connecting more than one electronic unit with the physical unit and connecting at least two of the electronic units with each other and transmitting a response of a first electronic unit as a challenge of a second electronic unit, so that a series of challenges and responses are created and that, after a determined number of internal challenges and responses, a transmitter provides the final response signal as a reaction of the first challenge.
  • a method comprises implementing a physically unclonable function in the physical unit or in the electronic unit.
  • a physically unclonable function (PUF), which is based preferably on the structural properties of the physical unit or other material-related or manufacturing-related properties or data of the physical unit.
  • the method comprises the steps of providing at least one sensor, the sensor is configured to detect material properties or structural properties of the physical unit, connecting the sensor with or integrating the sensor into the physical unit and detecting material properties or structural properties as a response to a challenge and outputting a structure dependent value as a response to the challenge.
  • Original material properties or structural properties, or material properties or structural properties established during the manufacturing or resulting from the manufacturing of the physical unit and/or subsequently unpredictably modified material properties or structural properties or data of material properties or structural properties are sensed or stored in the storage and outputted as a response of a specific challenge.
  • the total number of possible unpredictable challenge-response pairs is infinite, such that it is impossible to store, to model or to simulate and this makes them and as a result the physical unit impossible to copy or clone.
  • mu- tations are changes in the nucleotide sequence of the genetic material of an organism. These mutations can occur deliberately under cellular control during processes or by being exposed to external influences, which would come up with new DNA-like structural changes.
  • the engineering simulation to this biological mutation can be assigned as "hyper mutation", which means to motivate changes by injecting entities or expose the structure to influences that are able to create reproducible permanent responses when they are challenged later.
  • This challenge- response space is unpredictable and mostly unique and unclonable especially if its space is sufficient large and hard or impossible to predict, copy, model or simulate.
  • the hyper mutation process will provide DNA-like markers to be used in what might be called structure-physically unclonable function, approaching the bio mapping technique which links specific gene markers to the paired specific individual identities. This "mutation" can be intentionally caused or created during the fabrication process for later identification purposes.
  • the date stored in the data storage, the permanently stored secret functions or the structure features of the physical unit can be changed after fabrication of the physical unit.
  • Implementing or injecting the DNA- like identity of the physical unit is performed by an end-user or a trusted authority after the fabrication at the end-user-site without involving the manufacturer in a so called "post-fabrication-mutation" operation.
  • the manufacturer of the physical unit is kept basically out of the security process which results in higher private security and independency.
  • the method for identifying a physical unit comprising the steps of providing at least one electronic unit working on a challenge-response principle.
  • the electronic unit is directed and configured to work on the challenge-response principle and is provided with a secret unknown function and a transmitter or a data storage and a transmitter.
  • the method further comprises the step of connecting the physical unit permanently and irreversibly with the at least one electronic unit and storing a number or list of different challenge-response pairs of different responses in the data storage or a secured data storage by a verifier, whereas each response corresponds to a specific challenge so that the transmitter provides a response signal as a reaction of the challenge on the structure and its electronic unit.
  • the method further comprises the step of presenting a challenge from the secured list to the electronic unit and deleting the presented challenge as well as its corresponding response permanently from the list after receiving a correct response.
  • a correct response or authenticating response is an expected response, which means a response, which corresponds to the respective challenge as in the secured stored list.
  • the method comprises the step of comparing the received response with the expected response and outputting a confirmation signal when the received response matches the expected response and outputting an error signal when the received response does not match with the expected response stored in the secured identification pairs list.
  • the electronic unit is undetectably connected to the physical unit during the manufacturing process of the physical unit, especially embedded in the physical unit and completely surrounded by material to avoid access to electronic unit from outside without damaging the physical unit, the physical unit's properties and hence its identity.
  • the electronic unit may be provided with a receiver and the receiver may be connected with the data storage and responses may be filed in the data storage after connecting the electronic unit with the physical unit. According to another aspect, more than 100, preferably more than 100000 responses are filed in the data storage.
  • the electronic unit may be provided with a receiver and the receiver may be connected to a self-reconfiguring intelligent function resulting after a single event trigger with a permanent secret unknown function which is unpredictable, un-removable, and hard to clone or to model and impossible to store all its challenge-response pairs.
  • a randomly selected set of several hundreds of challenge-response pairs are randomly selected and securely stored securely by the verifier for later re-identification of the physical structure together with its incorporated electronic unit.
  • the method comprises the step of connecting more than one electronic unit with a physically unit, connecting at least two of the electronic units with each other and transmitting a response of a first electronic unit as a challenge of a second electronic unit.
  • physically unclonable function may be implemented in the physical unit and/or in the electronic unit to assign a structural-electronic joint identity to the physical unit.
  • the method comprises the steps of providing at least one sensor, the sensor is configured to detect material properties or structural properties of the physical unit, connecting the sensor with the physical unit or integrating the sensor into the physical unit and detecting material properties or structural properties present in the physical unit as a response to a challenge and out- putting identifying values or detected values of material properties or structural properties as a response to the challenge.
  • the method comprises the step of storing original material properties or structural properties, storing material properties or structural properties established during the manufacturing or resulting from the manufacturing of the physical unit and/or storing subsequently modified material properties or structural properties or data of material properties are structural properties in the data storage and outputting the stored data as a response to a challenge.
  • a system for conducting a method for labeling or identifying a physical unit comprises at least one electronical unit, which is permanently connected to or embedded in a physical unit.
  • the electronic unit works on a challenge-response principle and is provided with a data storage and a transmitter. A number of different responses is stored in the data storage, whereas each response is assigned to a specific challenge.
  • the transmitter provides a response signal as a reaction of a specific challenge.
  • a presenting unit, configured to present a challenge from list to the electronic unit is part of the system and an evaluation unit is configured to receive a response from the transmitter and to compare the received response with an expected response. The expected response is a response which is assigned to a specific challenge in the list.
  • the electronic unit is coupled with at least one sensor, which in turn is connected with or integrated in the physical unit.
  • the electronic unit is coupled with at least one actuator, for example an ultrasonic source, an optical source, a vibration source, etc , which is internally connected with or integrated in the physical unit.
  • the sensor may detect material properties, structural properties or challenges, for example electromagnetic evaluation, acoustic signals, vibrations or other signals like ultrasound waves.
  • the actuator may emit ultrasound signals, optical signals, vibrational signals or the like.
  • the electronic comprises at least one piezoelectric element, which may be stimulated by an ultrasonic wave train creating an acoustic signal wave response.
  • the piezoelectric element may be stimulated by an ultrasonic signal train creating an acoustic signal wave response at another piezoelectric element which can act as sensor as well as actuator.
  • the electronic unit or units or sensors may be distributed in the physical unit, preferably evenly or homogeneously distributed in or at the physical unit.
  • the electronic units or sensors may be distributed evenly or homogeneously in all 3 dimensions of the physical unit, to establish a 3-dimensional (3D) distribution.
  • the electronic unit comprises an interface configured to receive data representing responses from outside the physical unit and to transmit the data to the data storage.
  • the electronic unit comprises an interface configured to receive challenges from outside the physical unit and to transmit the challenges to the data storage or to microprocessor for processing the received challenges.
  • the interface is an acoustical, optical or piezoelectric interface.
  • the challenge is an acoustical, optical or piezoelectric or a combination of many simultaneous measurable stimulus and response behavior within the structure's material.
  • the identification protocol may proceed as follows.
  • a proving authority generates from a DNA-like unknown function a list of L challenge-response pairs (Ci, Ri) and keeps them secret for itself.
  • This list of challenge-response pair is kept secret by the authority, which will serve later to re-identify the object remotely.
  • An object or physical unit is considered authentic, if it delivers the correct response to any selected C-R pair from the list. The used C-R pair should be deleted from the list and will never be used again forsecurity reasons.
  • Figure 1- illustrates a basic structure of an unclonable physical structure identity.
  • Figure 2- illustrates i-fabrication and post-fabrication identity alternations.
  • Figure 3- illustrates a model of a DNA-like structure identity.
  • Figure 4- illustrates an automated remote secured identification.
  • Figure 5- illustrates a model for embedding ultrasound piezoelectric transducers in a physical unit.
  • Figure 6- illustrates an analysis of an ultrasonic wave trying stimulation.
  • Figure 7- illustrates a basic application scenario for automated secure certification of physical unit.
  • Figure 8- illustrates a basic application scenario for identifying artefacts.
  • Figure 9- illustrates a basic scenario for a smart home application.
  • Figurel O- illustrates a model of a sensor-actuator piezoelectric element.
  • Figure 11 illustrates a schema of biological DNA-mapping.
  • Figure 12 illustrates classes for born and mutated structure identities.
  • Figure 13 illustrates classifications of mutated in-fabrication structure identities.
  • Figure 14 illustrates classifications of mutated post-fabrication structure identities.
  • a concept for physical structure identity assigned as "struc-tronic identity” is proposed, having the effect of a DNA-like provable identity for physical units, especially building units.
  • the invention is not restricted to building units but can also be used on other physical units such as automotive parts, communication devices, IT- equipment, household devices, weapons, safety-relevant item or complex structures. It serves as a robust security anchor in a smart environment, a smart home and smart city environments and in the increasing field of interconnected items, units, devices or components.
  • a large variety of data is collected from sensors and devices implanted in physical units, devices, items or buildings to achieve value- added services.
  • a fundamental requirement is to accommodate in each relevant, involved physical unit or physical entity a uniquely clone-resistant provable identity.
  • DNA-like structure identification is inspired from the biological DNA.
  • DNA exists in virtually every cell of the human body or any biological body and is considered as a robust identification entity, which provides un-ambiguous and almost unclonable proof of identity. Even when only about 1% of the total basis differs from one individual to another, these particular sites referred to as SNP are used for identification.
  • SNP single nucleic acid
  • the markers through the genome are used to identify individuals by linking the genotype or particular markers with the phenotype or the trait of interest. In biology, this is called 'mapping'. This linking helps the scientist to associate a particular 'marker' with a specific case or 'identity' as illustrated in Fig. 11.
  • Fig. 3 shows a model for the targeted approach for a DNA like identity similar to the biological DNA.
  • a challenge-response mechanism is used to re-identify the structure by stimulating a randomly selected challenge C, to locate a particular property P, and deliver a response R, from a particular part of a very long chain.
  • the Challenge-Response technique deployed in cryptographic identification is applied.
  • the identification protocol in summary proceeds as follows:
  • the proving authority generates from the DNA-like function (as in Fig. 3) a list of L- challenge-response pairs (Ci, Ri). This list is kept secret by the authority, which will serve later to re-identify the object remotely. An object is considered authentic, if it delivers the correct response to any randomly selected C-R pair from the list. The used C-R pair should preferably be deleted from the list and never be used again for optimum security.
  • a structure's born DNA-like identity is based on some born natural properties which do originally exist in the element according to its own individual natural structure resulting from the fabrication procedures. As a matter of fact, different structure properties result often even when all elements are equally treated. The reason is that some randomly distributed mixtures of material result with some particular unclonable, possibly unique and highly non-reproducible form (impossible to be reproduced). Such inherited features, flaws, and amorphous material structures are distributed randomly within the body of the element, such that any attack on the structure's body would change its properties and hence its identity. Fig.
  • S-PUF inherited structure PUF
  • electronic secured transponder made unclonable for example as in US 2012/0002803A1 disclosed, to be sensed and form an integrated joint "struc-tronic" unit, which can be remotely identified by using the challenge- response mechanism.
  • a remote identifier device can induce the necessary energy and the challenge sequence C, and reads its joint corresponding response R, contributed from both structure and the electronic unit.
  • mutations are changes in the nucleotide sequence of the genetic material of an organism. These mutations can occur deliberately under cellular control during processes or by being exposed to an external factor, what will come up with new DNA structure changes.
  • the engineering simulation to this bio- mutation assigned as "hyper mutation” which means to motivate changes by injecting entities that are able to create re-producible response when they are challenged later.
  • This challenge-response space should be mostly unique and unclonable especially when its space is sufficiently large such that it is hard or impossible to rebuild, model or store.
  • Such hyper mutation process should provide DNA-like "markers” to be used in what might be called structure- physically unclonable function or "S-PUF" approaching the bio mapping technique which links specific gene markers to the paired specific identities, as indicated in Fig 1 1.
  • This mutation can be caused during the fabrication process, that is in-fabrication.
  • Fig 2 shows a generic model for a suggested technique to inject and/or activate a mutation into a structural element during fabrication in order to create a mutated "struc-tronic" unit, which is unique, permanent, unclonable and can be re-identified later.
  • Post-Fabrication mutation is the same as In-Fabrication type; however, injecting the DNA-ldentity is performed by the end-user and/or a trusted authority after the fabrication at the deliberatelyend-user"-site without involving the manufacturer in that "Post- Fabrication Mutation” operation. That is, the manufacturer is kept basically out of the security game which results with higher security and independency.
  • Fig. 4 shows a possible remote sensing and identification as a three-way protocol:
  • the internal Electronic Transponder Unit or "ETU” is challenged to sense a DNA-like entity by inducing sufficient electromagnetic energy to deliver the corresponding DNA-response.
  • the response is received by an acquisition unit, which is linked to the network.
  • the unit could be a hand-held low-cost device or a permanently mounted one.
  • the network manages the identification process by the help of a responsible trusted authority server with its complete resources and powerful capacity.
  • the DNA like identity can be created according to two creation categories as shown in Fig. 12:
  • Category 1 Based on using natural inherited (born) properties/markers of the physical structure. (Fig. 12)
  • Category 2 based on using mutated attributes, that can be created during fabrica- tion, namely in “in-fabrication process” (deeply injected or diffused) or in "post- fabrication process” by intentionally creating irreversible changes within the material, as shown in Fig. 13 and Fig. 14.
  • Markers are tiny parts of a very large (preferably infinite) number of attributes/properties derived from the physical structure.
  • the properties that can be deployed for the proposed S-PUF should be provable, unclonable, unchangeable, with high probability of uniqueness, measurable, unpredictable, secret, resilient, consistent and possibly diffusible in the whole physical body, When the structure is physically attacked, the attributes change and hence the identity can be destruct- ed.
  • Markers/ attributes can be extracted from the physical structure for example from the amorphous material distribution or/and micro-crystal or nano- structures or/and adopting properties as electromagnetic, electrical, acoustic, optical, radiation or chemical profile/ propagation as shown in Fig. 14.
  • the properties that can be deployed for the proposed S-PUF should be measurable, unique and structure-insensitive. They should differ even if equally fabricated. Any attempt to fabricate a structure as a duplicate should be virtually impossible or at least infinitely complex.
  • the material properties used as identification markers should be non-replaceable and be an essential operational part of the structure.
  • the sensing and stimulation technology could use smart materials, which incorporate built-in or intrinsic sensors, actuators and control mechanisms. This would allow sensing the response of any random stimulus.
  • the material should respond consistently in a predetermined manner and extent, in adequately short time, reverting to its original state as soon as the stimulus is removed. This means that time constraint could also be seen as security improving technique.
  • Possible components of a smart material can be - but is not limited to - one or several selections of the following example technologies:
  • Piezoelectric materials (actuators - sensors).
  • Shape memory alloys (actuators - sensors).
  • Fiber- optic materials and sensors are Fiber- optic materials and sensors.
  • Micro electro-mechanical systems (chemical-pressure sensors-micro pumps). Micro opto-electro mechanical systems.
  • Physical properties like: specific gravity, density, apparent density, bulk density, solidity and porosity, fill rate and possibly void age and hydro properties.
  • Thermal properties like thermal conductivity, thermal capacity, thermal deformation.
  • Piezoelectric material is low-cost and attractive means for both actuators and sensors or transducers. It converts for example a deformation applied on it to an electric signal and vice versa an applied signal into deformation; up to 4% volume deformation is possible. A mechanical oscillation is reached by repeatedly expanding and contracting when a alternating voltage is applied on it.
  • Fig. 10 shows the same piezoelectric material serving both functions as actuator and sensor.
  • piezoelectric ceramic PZT: lead zirconate titanate
  • Fig.5 shows a possible setup scenario for embedding piezoelectric elements together with intelligent microelectronic unit in a building structure to compose a "struc-tronic" DNA-like physical identity.
  • the applied electromagnetic challenge induces sufficient energy to the unit to activate/power it and generate internally a set of random signal sequences as challenge , of ultrasonic waves (or possibly optical waves) at different frequencies that stimulates the structure.
  • the acoustic waves propagate, refract, diffract and reflect within the internal structure of the building element creating in each individual unit individual response Ri correspondent to the given acoustic (possibly optical) challenge C,.
  • the pair Ci - R is likely unique, unclonable and able to prove the individual building unit authenticity.
  • the resulting piezoelectric stimulation and responses is expected to have usable resolution.
  • Several senders and receivers could be deployed for higher information response diversity (key-entropy).
  • Fiber-optical entities can be integrated in the fabrication process and attached randomly to optical sources as stimulus (challenge sources) and sensors to measure (responses) in different time-slots and frequencies optical refraction, diffraction and reflection within the unit-under-check to repeatedly create a personal property profile for the physical unit which is impossible to store, model or refabricate.
  • Fig. 7 shows a possible fabrication and use procedure of building units, which would be- come impossible or hard to clone. A possible use procedure can be set in 5 stages.
  • stage 1 the units are fabricated equally by the same fabrication process.
  • stage 2 the manufacturer/or a trusted authority creates a certified, clone-resistant or possibly unclonable identity in each individual unit.
  • Stage 3 the units are distributed by any unsecure third party.
  • Stage 4 the units are consumed/integrated in a building construction.
  • stage 5 a surveillance engineer can check them on site electronically and remotely sensed by an automated fast process to get the assurance that no fake or cloned elements are involved.
  • This provable, unclonable or clone-resistant identity can serve also later in tracing liability, guarantee and forensic procedures as well. This is quite essential for special constructions requiring approvable and traceable liability.
  • secure unique identities in precast concrete elements can also allow automated distant-supervision of a construction process when the construction sequence is pre-determined or for automated highly secured constructions, even in unsecure environment. The resulting identification is also authentic for juridical disputes and legal evaluation.
  • Fig. 8 shows a possible scenario for a reliable remote secured authentication of an artifact depending on the proposed secure structure identity to avoid the complicated conventional reinvestigation procedures.
  • stage 1 sophisticated expensive lab analysis is deployed to determine the authenticity of an ancient artifact.
  • stage 2 a unique non-removable identity is injected or attached permanently in/to the original artifact allowing reliable and provable authentication.
  • stage 3 two equally looking artifacts, an original and a cloned one are presented.
  • stage 4 the checking authority can remotely challenge both artifacts.
  • stage 5 a responses' list is sent to a verification server and only the artifact with the secured unclonable identity is approved.
  • Creating such a unique and unclonable identity could play an essential role in protecting and preserving the cultural heritage of artifacts or monuments as they can be remotely and securely identified even under severe restrictions in automated and fast fashion.
  • This application scenario is not limited to artifacts but it can be applied to any valuable object to prove it is authenticity/ identity in an automated way (e.g. automated watermarks reidentification).
  • Smart buildings and smart cities are becoming more and more near future targets to incorporate intelligent components in virtually any entity in every day's life environment.
  • Smart Home environments are typically equipped with different kinds of sensors and tracking devices for context-aware service provisioning.
  • customers want to take advantage of new comfort and benefit of personalized context-aware services.
  • the question arises how to build up trust into inherently untrusted services in a potentially hostile environment. It should be possible to guarantee that the information that the owner gets from his smart home is sent for sure by his own home not a cloned pretending one. This requires unambiguous, provable and clone-resistant entities.
  • Fig.9 shows a concept for a secured building identity to serve in possible emerging smart homes applications.
  • stage 1 a smart home is equipped with different devices for context-aware service provisioning and certified clone resistant building entities.
  • stage 2 a tamper proof, unclonable monitoring camera is attached to a certified building element with unclonable provable identity forming together a unique certified integrated unit.
  • Stage 3 an attacker uses the same cloned camera but detached from the original building element trying to communicate pretending being the original one.
  • Stage 4 a trusted authority can check the identity of both senders remotely by challenging both units.
  • stage 5 a list of responses is sent to a verification centre to be securely identified.
  • stage 6 the true identity is approved and the fake one is denied.
  • unclonable location is required. Since GSM location coordinates are possible to be faked, then a secured unclonable identified building unit can provide a remote undeniable, trustable endorsement as proof of claimer's location -who claims to share its location- whenever required. This provides a trustable secured witness for unclonable geographic location.
  • This DNA like identity for physical structures can help not only for authentication purposes, but also in checking the structure stability of the device or physical unit in hard to reach circumstances, such as water resources or special constructions, which are required to be distantly monitored. Moreover, it can help for re- identifying the structure by checking its DNA like identity as in crashed planes or space shuttles. In general, this unclonable provable identity can be helpful for special structures like tanks, bridges, dams, nuclear reactors or any other structures that require high safety and security standards.
  • the DNA like identity can be irreversibly injected to existing structures for authentication and re-identification purposes as a tool to remotely re-identify an artefact after its authenticity is determined through sophisticated labs investigations. Irreversibly injected means, that the identity will be destroyed if the injected entities were to be removed.
  • Physical structures or physical units provided with this unclonable identity can be life-long easily tracked and re-identified.
  • the authentication and the construction procedure can be checked remotely on the site.
  • the struc-tronic identity can provide a secure automatic cryptographically authenticated history memory of the life-cycle of the physical unit or physical element, which might be important for liability and reliability purposes.
  • the struc-tronic identity provides many advantages as providing secured and certified measurements by the unclonable identity without the need to send a person to prove the state and identity of the rotor blades, enabeling automated certified material health measurements for liability and guarrantee issues.
  • the proposed 3-D well distributed and diffusible entities can be employed to react to more precise and tiny changes within the structure (be more sensitive) and to give more specific info than the structural health monitoring entities which are normally located in the most critical points and interpret local changes.
  • the unclonable identity is a very essential requirement to establish any secure communication in the internet of things environment. In that case any measured sensor value (as electricity counter) on open communication network can be authenticated by the said struc-tronic identity.
  • Ultrasonic generators and sensors can be used to create the DNA-like properties of the physical structure which are hard to model, copy, store and hence impossible to reproduce resulting with unclonable properties, as shown in Fig.5.
  • Ultrasonic sensors and sources can be placed randomly in the unit body by an irreversible process. The generation of different frequencies at different time slots from different sources should result with the measured unclonable individual responses for each single unit after fabrication.
  • Fibre-optical entities can be integrated in the fabrication process and attached randomly to optical sources stimulus and sensors to measure in different time- slots and frequencies optical refraction, diffraction and reflection within the unit under check to repeatedly create a personal property profile for the physical unit which is impossible to store, model or refabricate.
  • the trusted authority challenges the unit by a secretly selected part of the unlimited challenge-response pairs to re- identify the unit. This can be seen marker as usually biological DNA-Chains are checked to be re-identified.
  • a technology for fabricating and identifying clone-resistant physical units is proposed.
  • Several possible applications in emerging inerconnected enviroment, smart-homes and smart-cities are illustrated.
  • Possible concepts for realization technologies to approach a DNA-like structure identity are proposed.
  • the targeted outcomes are expected to exhibit novel low-cost fabrication technologies towards clone-resistant physical units and building structures for emerging near future applications.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne une technologie de fabrication et d'identification d'unités physiques résistantes aux clones. Plusieurs applications possibles dans un environnement interconnecté émergent, des maisons intelligentes et des villes intelligentes sont illustrées. Des concepts possibles pour des technologies de réalisation pour approcher une identité de structure de type ADN sont proposés. Les résultats ciblés sont attendus pour présenter de nouvelles technologies de fabrication à faible coût en ce qui concerne des unités physiques résistantes aux clones et des structures de construction pour des applications futures émergentes.
EP17721458.2A 2017-03-10 2017-03-10 Procédés et système de marquage et de détection d'une unité physique résistante aux clones Pending EP3593274A1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2017/000285 WO2018162938A1 (fr) 2017-03-10 2017-03-10 Procédés et système de marquage et de détection d'une unité physique résistante aux clones

Publications (1)

Publication Number Publication Date
EP3593274A1 true EP3593274A1 (fr) 2020-01-15

Family

ID=58670100

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17721458.2A Pending EP3593274A1 (fr) 2017-03-10 2017-03-10 Procédés et système de marquage et de détection d'une unité physique résistante aux clones

Country Status (2)

Country Link
EP (1) EP3593274A1 (fr)
WO (1) WO2018162938A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201919297D0 (en) 2019-12-24 2020-02-05 Aronson Bill Temperature sensing physical unclonable function (puf) authenication system
US11516028B2 (en) 2019-12-24 2022-11-29 CERA Licensing Limited Temperature sensing physical unclonable function (PUF) authentication system

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4329393A (en) 1980-05-21 1982-05-11 Minnesota Mining And Manufacturing Company Coating compositions for retrospective identification of articles
IL130585A0 (en) 1999-06-21 2000-06-01 Curie Authentication Technolog Marked difficult-to-counterfeit documents
US7115301B2 (en) 2001-04-09 2006-10-03 Rixflex Holdings Limited Method of marking solid or liquid substances with nucleic acid for anti-counterfeiting and authentication
JP4158009B2 (ja) 2001-12-11 2008-10-01 信越化学工業株式会社 合成石英ガラスインゴット及び合成石英ガラスの製造方法
US7840803B2 (en) * 2002-04-16 2010-11-23 Massachusetts Institute Of Technology Authentication of integrated circuits
DE102004002410B4 (de) 2004-01-16 2008-09-18 Infineon Technologies Ag Identifizierungs- oder Authentifizierungsmedium
US9208394B2 (en) 2005-09-05 2015-12-08 Alpvision S.A. Authentication of an article of manufacture using an image of the microstructure of it surface
EP2024899B1 (fr) 2005-09-05 2015-11-04 Alpvision S.A. Moyen permettant d'utiliser une microstructure de surface de materiaux comme identificateur unique
EP2168072B1 (fr) * 2007-06-14 2010-12-22 Intrinsic ID B.V. Dispositif et procédé pour procurer une authentification
DE102008015466A1 (de) 2008-03-22 2009-09-24 Informium Ag Sicherheitskennzeichnung
AU2009231240B2 (en) 2008-04-02 2014-03-20 Sicpa Holding Sa Identification and authentication using liquid crystal material markings
DE102008034022A1 (de) 2008-07-16 2010-01-21 Merck Patent Gmbh Verfahren zur Herstellung eines Sicherheits- und/oder Wertprodukts mit Teilbereichen mit unterschiedlicher Lumineszenzemission
EP2333749B1 (fr) 2009-12-10 2013-10-16 Universität Bayreuth Empreinte artificielle
US20120002803A1 (en) 2010-07-02 2012-01-05 Wael Adi Self reconfiguring vlsi architectures for unknown secret physical functions based crypto security systems
EP2615571A1 (fr) * 2012-01-16 2013-07-17 Gemalto SA Procédé de génération d'un identifiant pour un appareil électronique
DE102013009830A1 (de) 2013-06-06 2014-12-11 Bally Wulff Games & Entertainment Gmbh Kennzeichnung von Systemkomponenten eines Spielautomaten
DE102013013108A1 (de) 2013-08-06 2015-02-12 Jürgen Martens Lanthanidhaltige Markierungszusammensetzung zur fälschungssicheren Kennzeichnung von Gegenständen, ihre Herstellung und Verwendung
EP2950232A1 (fr) * 2014-05-30 2015-12-02 Nxp B.V. Identification de biens

Also Published As

Publication number Publication date
WO2018162938A1 (fr) 2018-09-13

Similar Documents

Publication Publication Date Title
CN102077205B (zh) 用于检验物品的真实性、完整性和/或物理状态的设备、系统和方法
TWI813677B (zh) 用於自動物件辨識及鑑認之方法及系統
CN110601853B (zh) 一种区块链私钥生成方法以及设备
JP7295927B2 (ja) ブロックチェーンにより実装される方法及びシステム
Gassend Physical random functions
Willers et al. MEMS gyroscopes as physical unclonable functions
CN1956372B (zh) 指示相关密码令牌的参数的数字证书
JP2022521488A (ja) 分散型台帳環境における物理的オブジェクトのトークンベースのアンカリングのための方法およびシステム
CN107210919A (zh) 在设备与装置之间建立信任的方法
CN109475327A (zh) 根据取向信息生成唯一码
CN102422296A (zh) 对由测试装置对安全芯片的访问进行认证的方法
TWI268077B (en) Remote unblocking with a security agent
Liang et al. Study on PUF based secure protection for IC design
EP3593274A1 (fr) Procédés et système de marquage et de détection d'une unité physique résistante aux clones
US20190280881A1 (en) Low friction device enrollment
Lesjak et al. A secure hardware module and system concept for local and remote industrial embedded system identification
GB2590758A (en) Temperature sensing physical unclonable function (PUF) authentication system
Gope et al. A comparative study of design paradigms for PUF-based security protocols for IoT devices: Current progress, challenges, and future expectation
De Santis et al. Blockchain-based infrastructure to enable trust in IoT environment
Adi et al. Physical and mechatronic security, technologies and future trends for vehicular environment
CN105278944B (zh) 资产标识
JP2006238142A (ja) タグ認証システム、認証装置、及び、タグ認証方法
CN104333450B (zh) 一种可信自助服务系统的建立方法
Aldroubi et al. Towards clone-resistant building structures
Falk et al. New directions in applying physical unclonable functions

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20191009

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RIN1 Information on inventor provided before grant (corrected)

Inventor name: ADI, WAEL

Inventor name: ALDROUBI, SOUHER

Inventor name: MEINLSCHMIDT, PETER

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20211004

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: TECHNISCHE UNIVERSITAET BRAUNSCHWEIG

Owner name: FRAUNHOFER-GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V.