JP2017139757A - 半導体チップの冗長アドレスを用いたチップ認証の物理的な複製防止機能(pcid) - Google Patents
半導体チップの冗長アドレスを用いたチップ認証の物理的な複製防止機能(pcid) Download PDFInfo
- Publication number
- JP2017139757A JP2017139757A JP2017011804A JP2017011804A JP2017139757A JP 2017139757 A JP2017139757 A JP 2017139757A JP 2017011804 A JP2017011804 A JP 2017011804A JP 2017011804 A JP2017011804 A JP 2017011804A JP 2017139757 A JP2017139757 A JP 2017139757A
- Authority
- JP
- Japan
- Prior art keywords
- chip
- authentication code
- semiconductor
- semiconductor chip
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/18—Address generation devices; Devices for accessing memories, e.g. details of addressing circuits
- G11C29/30—Accessing single arrays
- G11C29/34—Accessing multiple bits simultaneously
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/02—Detection or location of defective auxiliary circuits, e.g. defective refresh counters
- G11C29/022—Detection or location of defective auxiliary circuits, e.g. defective refresh counters in I/O circuitry
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/02—Detection or location of defective auxiliary circuits, e.g. defective refresh counters
- G11C29/025—Detection or location of defective auxiliary circuits, e.g. defective refresh counters in signal lines
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/02—Detection or location of defective auxiliary circuits, e.g. defective refresh counters
- G11C29/027—Detection or location of defective auxiliary circuits, e.g. defective refresh counters in fuses
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/1201—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details comprising I/O circuitry
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/14—Implementation of control logic, e.g. test mode decoders
- G11C29/16—Implementation of control logic, e.g. test mode decoders using microprogrammed units, e.g. state machines
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/18—Address generation devices; Devices for accessing memories, e.g. details of addressing circuits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/18—Address generation devices; Devices for accessing memories, e.g. details of addressing circuits
- G11C29/24—Accessing extra cells, e.g. dummy cells or redundant cells
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/18—Address generation devices; Devices for accessing memories, e.g. details of addressing circuits
- G11C29/26—Accessing multiple arrays
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/36—Data generation devices, e.g. data inverters
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/44—Indication or identification of errors, e.g. for repair
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/56—External testing equipment for static stores, e.g. automatic test equipment [ATE]; Interfaces therefor
- G11C29/56008—Error analysis, representation of errors
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/70—Masking faults in memories by using spares or by reconfiguring
- G11C29/78—Masking faults in memories by using spares or by reconfiguring using programmable devices
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/70—Masking faults in memories by using spares or by reconfiguring
- G11C29/78—Masking faults in memories by using spares or by reconfiguring using programmable devices
- G11C29/783—Masking faults in memories by using spares or by reconfiguring using programmable devices with refresh of replacement cells, e.g. in DRAMs
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C7/00—Arrangements for writing information into, or reading information out from, a digital store
- G11C7/24—Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/1202—Word line control
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/1204—Bit line control
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/18—Address generation devices; Devices for accessing memories, e.g. details of addressing circuits
- G11C2029/1806—Address conversion or mapping, i.e. logical to physical address
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/4402—Internal storage of test result, quality data, chip identification, repair information
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/56—External testing equipment for static stores, e.g. automatic test equipment [ATE]; Interfaces therefor
- G11C2029/5606—Error catch memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Semiconductor Integrated Circuits (AREA)
- For Increasing The Reliability Of Semiconductor Memories (AREA)
Abstract
【解決手段】半導体チップはモジュラー領域およびテスト回路を含み、前記モジュラー領域はそれぞれ冗長ビット線を含むメモリセルアレイと少なくとも冗長アドレスを記録する周辺メモリからなる複数のモジュラーエリアを含む。テスト回路は半導体チップに固有の冗長アドレスを取得する。冗長アドレスの分布はモジュラー領域内のモジュラーエリアの一部あるいは全部に関連してランダムに形成される。テスト回路は物理チップ認証計測装置から受け取る指定コードに応じて半導体チップに固有な物理的特徴から生成した乱数を出力する。
【選択図】図1
Description
D(i,a) = modf (C(i) + R(a) ) ------- 式1
D(i,a) = modv (C(i) + R(a) ) ------- 式2
D(a) = modf (R(a) ) ------- 式3
D(a) = modv (R(a) ) ------- 式4
D(a) = R(a) ------- 式5
2 プロセッサ
3 不揮発メモリ
4 DRAM
5 アナログユニット
6 高周波ユニット
7 センサー
8 DRAM内蔵プロセッサの第一の例
9 パッケージ内にDRAMを内蔵しているプロセッサ
10 パッケージ内の内蔵DRAM
11 外部DRAM
12 DRAM内蔵プロセッサの第二の例
13 チップ内にDRAMを内蔵しているプロセッサ
14 チップ内の内蔵DRAM
15 全ビット線
16 再割付に利用した冗長ビット線
17 全冗長ビット線
Claims (12)
- 半導体チップから構成され、
前記半導体チップは、複数のモジュラーエリアからなるモジュラー領域および前記チップに固有の冗長アドレスを取得するテスト回路から構成され、
前記冗長アドレスは、前記モジュラー領域のモジュラーエリアの一部あるいは全部に関してランダムに生成され、
前記複数のモジュラーエリアは、それぞれ、冗長ビット線を含むメモリセルアレイと、少なくとも前記冗長アドレスを記録する周辺メモリとから構成され、
前記テスト回路が、物理チップ認証計測装置から受信する指定コードに応じて、前記半導体チップに固有の物理的性質から生成した乱数を出力する
ことを特徴とする半導体装置。 - 前記半導体チップは、更に、デジタルコード生成回路を構成要素とし、前記デジタルコード生成回路は、特定の方法に応じて前記乱数を用いて出力認証コードを生成することを特徴とする請求項1記載の半導体装置。
- 前記テスト回路は、前記デジタルコード生成回路に前記出力認証コードを生成させるため、前記乱数を入力認証コードに合成し、前記物理チップ認証計測装置は前記入力認証コードを受信することを特徴とする請求項2記載の半導体装置。
- 前記デジタルコード生成回路は前記半導体チップ内の組み込み回路であり、プログラム可変であることを特徴とする請求項2記載の半導体装置。
- 前記デジタルコード生成回路は前記乱数に応じて前記出力認証コードを生成し、前記出力認証コードは前記物理チップ認証計測装置に送られることを特徴とする請求項1記載の半導体装置。
- 前記デジタルコード生成回路は前記乱数に応じて前記出力認証コードを生成し、前記出力認証コードは前記物理チップ認証計測装置に送られることを特徴とする請求項2記載の半導体装置。
- 前記モジュラーエリアが半導体メモリエリアであることを特徴とする請求項1記載の半導体装置。
- 前記乱数を生成する前記モジュラーエリアが半導体メモリエリアであることを特徴とする請求項2記載の半導体装置。
- 前記半導体チップがパッケージ内に同梱され、前記出力認証コードが前記パッケージの出力認証コードとして使用されることを特徴とする請求項5記載の半導体装置。
- 前記半導体チップがパッケージ内に同梱され、前記出力認証コードが前記パッケージの出力認証コードとして使用されることを特徴とする請求項6記載の半導体装置。
- 物理チップ認証計測装置が、指定コードを半導体チップに送り、前記半導体チップから出力認証コードを出力させ、前記出力認証コードを受け取り、前記半導体チップを認証することを特徴とする半導体チップの認証方法。
- 物理チップ認証計測装置が、指定コードおよび入力認証コードを半導体チップに送り、前記半導体チップから出力認証コードを出力させ、前記出力認証コードを受け取り、前記半導体チップを認証することを特徴とする半導体チップの認証方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016019153 | 2016-02-03 | ||
JP2016019153 | 2016-02-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2017139757A true JP2017139757A (ja) | 2017-08-10 |
Family
ID=58185241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2017011804A Pending JP2017139757A (ja) | 2016-02-03 | 2017-01-26 | 半導体チップの冗長アドレスを用いたチップ認証の物理的な複製防止機能(pcid) |
Country Status (4)
Country | Link |
---|---|
US (1) | US10460824B2 (ja) |
EP (1) | EP3203477B1 (ja) |
JP (1) | JP2017139757A (ja) |
CN (1) | CN107038130B (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022065016A1 (ja) * | 2020-09-22 | 2022-03-31 | 渡辺浩志 | 自動認証icチップ |
JP7457029B2 (ja) | 2019-05-23 | 2024-03-27 | クリプトグラフィ リサーチ, インコーポレイテッド | 高度なメモリのための偽造防止適用 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015050125A1 (ja) * | 2013-10-04 | 2015-04-09 | 栗田工業株式会社 | 超純水製造装置 |
US10964379B2 (en) * | 2018-11-07 | 2021-03-30 | Arm Limited | Ring oscillator based bitcell delay monitor |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020168815A1 (en) * | 1999-10-22 | 2002-11-14 | Ralf Hartmann | Method for identifying an integrated circuit |
US20150074433A1 (en) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Physically unclonable function based on breakdown voltage of metal- insulator-metal device |
JP2015139010A (ja) * | 2014-01-20 | 2015-07-30 | 富士通株式会社 | 半導体集積回路、認証システム、及び認証方法 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3719654B2 (ja) | 2001-05-10 | 2005-11-24 | 松下電器産業株式会社 | Lsiテスト方法 |
JP2004227723A (ja) * | 2003-01-27 | 2004-08-12 | Renesas Technology Corp | 不揮発性半導体記憶装置 |
US6889305B2 (en) * | 2003-02-14 | 2005-05-03 | Hewlett-Packard Development Company, L.P. | Device identification using a memory profile |
JP2006085753A (ja) | 2004-09-14 | 2006-03-30 | Oki Electric Ind Co Ltd | 半導体記憶装置 |
JP4875963B2 (ja) * | 2006-10-30 | 2012-02-15 | ラピスセミコンダクタ株式会社 | 半導体記憶装置 |
US8605650B2 (en) * | 2008-06-10 | 2013-12-10 | Motorola Solutions, Inc. | System and method for interrupting a transmitting device in a communication system |
JP5499358B2 (ja) | 2010-03-24 | 2014-05-21 | 独立行政法人産業技術総合研究所 | 認証処理方法及び装置 |
JP5474705B2 (ja) * | 2010-08-23 | 2014-04-16 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
KR101139630B1 (ko) | 2010-12-09 | 2012-05-30 | 한양대학교 산학협력단 | 식별키 생성 장치 및 방법 |
JP5857726B2 (ja) | 2011-12-20 | 2016-02-10 | 富士通株式会社 | 温度センサ、暗号化装置、暗号化方法、及び個体別情報生成装置 |
WO2013104428A1 (en) * | 2012-01-13 | 2013-07-18 | Nec Europe Ltd. | Method for operating a wireless network, a wireless network and a device |
JP6063679B2 (ja) | 2012-09-10 | 2017-01-18 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
US9202040B2 (en) * | 2012-10-10 | 2015-12-01 | Globalfoundries Inc. | Chip authentication using multi-domain intrinsic identifiers |
US9038133B2 (en) * | 2012-12-07 | 2015-05-19 | International Business Machines Corporation | Self-authenticating of chip based on intrinsic features |
US9087611B2 (en) | 2013-03-14 | 2015-07-21 | Avago Technologies General Ip (Singapore) Pte. Ltd. | System and method for integrated circuit memory repair with binary-encoded repair control word |
US9219722B2 (en) * | 2013-12-11 | 2015-12-22 | Globalfoundries Inc. | Unclonable ID based chip-to-chip communication |
US20150188717A1 (en) * | 2013-12-26 | 2015-07-02 | Wei Wu | Physically unclonable function redundant bits |
KR20170008546A (ko) * | 2015-07-14 | 2017-01-24 | 에스케이하이닉스 주식회사 | 난수 발생 회로 및 이를 이용한 반도체 시스템 |
US9710041B2 (en) * | 2015-07-29 | 2017-07-18 | Intel Corporation | Masking a power state of a core of a processor |
-
2017
- 2017-01-26 CN CN201710057211.2A patent/CN107038130B/zh active Active
- 2017-01-26 EP EP17153235.1A patent/EP3203477B1/en active Active
- 2017-01-26 US US15/416,160 patent/US10460824B2/en active Active
- 2017-01-26 JP JP2017011804A patent/JP2017139757A/ja active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020168815A1 (en) * | 1999-10-22 | 2002-11-14 | Ralf Hartmann | Method for identifying an integrated circuit |
JP2003512698A (ja) * | 1999-10-22 | 2003-04-02 | インフィネオン テクノロジーズ アクチエンゲゼルシャフト | 集積回路の同定方法 |
US20150074433A1 (en) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Physically unclonable function based on breakdown voltage of metal- insulator-metal device |
JP2015139010A (ja) * | 2014-01-20 | 2015-07-30 | 富士通株式会社 | 半導体集積回路、認証システム、及び認証方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7457029B2 (ja) | 2019-05-23 | 2024-03-27 | クリプトグラフィ リサーチ, インコーポレイテッド | 高度なメモリのための偽造防止適用 |
WO2022065016A1 (ja) * | 2020-09-22 | 2022-03-31 | 渡辺浩志 | 自動認証icチップ |
Also Published As
Publication number | Publication date |
---|---|
US10460824B2 (en) | 2019-10-29 |
CN107038130B (zh) | 2024-05-28 |
US20170221581A1 (en) | 2017-08-03 |
EP3203477B1 (en) | 2020-01-01 |
CN107038130A (zh) | 2017-08-11 |
EP3203477A1 (en) | 2017-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200364374A1 (en) | Apparatus and method for generating identification key | |
US11729005B2 (en) | Apparatus and method for processing authentication information | |
Tehranipoor et al. | DRAM-based intrinsic physically unclonable functions for system-level security and authentication | |
Bhargava et al. | An efficient reliable PUF-based cryptographic key generator in 65nm CMOS | |
US9018972B1 (en) | Area-efficient physically unclonable function circuit architecture | |
Krishna et al. | MECCA: A robust low-overhead PUF using embedded memory array | |
TWI479870B (zh) | 基於puf透過機器對機器溝通在裝置之間認證的設備與方法 | |
US9030226B2 (en) | System and methods for generating unclonable security keys in integrated circuits | |
US20130147511A1 (en) | Offline Device Authentication and Anti-Counterfeiting Using Physically Unclonable Functions | |
Huang et al. | A PUF-based unified identity verification framework for secure IoT hardware via device authentication | |
JP2017139757A (ja) | 半導体チップの冗長アドレスを用いたチップ認証の物理的な複製防止機能(pcid) | |
US9590804B2 (en) | Identification information generation device and identification information generation method | |
CN103946854A (zh) | 以模糊算法和动态密钥为特征的基于保留的本征指纹识别 | |
CN101542496A (zh) | 利用物理不可克隆功能的身份验证 | |
Koeberl et al. | Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13 um SRAM | |
Zalivaka et al. | Design and implementation of high-quality physical unclonable functions for hardware-oriented cryptography | |
Kolhe et al. | LOCK&ROLL: Deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking | |
Mustapa | PUF based FPGAs for hardware security and trust | |
Koeberl et al. | A practical device authentication scheme using SRAM PUFs | |
JP2022121246A (ja) | 自動認証icチップ | |
Danger | Overview of Protections against IC Counterfeiting and Hardware Trojan Horses | |
Yang | Circuit Techniques for Low-Power and Secure Internet-of-Things Systems | |
Quadir | Anti-Reverse Engineering Techniques for Integrated Circuits and Electronics Hardware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20171127 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20180109 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180306 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20180821 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20181013 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20190312 |