WO2001050530A1 - Anti tamper encapsulation for an integrated circuit - Google Patents
Anti tamper encapsulation for an integrated circuit Download PDFInfo
- Publication number
- WO2001050530A1 WO2001050530A1 PCT/IB2000/002021 IB0002021W WO0150530A1 WO 2001050530 A1 WO2001050530 A1 WO 2001050530A1 IB 0002021 W IB0002021 W IB 0002021W WO 0150530 A1 WO0150530 A1 WO 0150530A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- circuit
- encryption
- data
- key
- memory
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/58—Structural electrical arrangements for semiconductor devices not otherwise provided for, e.g. in combination with batteries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
- G06F21/87—Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07372—Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/57—Protection from inspection, reverse engineering or tampering
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/57—Protection from inspection, reverse engineering or tampering
- H01L23/573—Protection from inspection, reverse engineering or tampering using passive means
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/57—Protection from inspection, reverse engineering or tampering
- H01L23/576—Protection from inspection, reverse engineering or tampering using active circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/15—Details of package parts other than the semiconductor or other solid state devices to be connected
- H01L2924/181—Encapsulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S257/00—Active solid-state devices, e.g. transistors, solid-state diodes
- Y10S257/922—Active solid-state devices, e.g. transistors, solid-state diodes with means to prevent inspection of or tampering with an integrated circuit, e.g. "smart card", anti-tamper
Definitions
- the protective member is a layer over and/or around the circuit, such as an encapsulation layer.
- the present invention comprises a circuit, with packaging substantially enclosing the circuit and designed in such a way that it participates in cryptographic protection of the circuit such that if the packaging is disturbed, normal function of the circuit cannot take place.
- a random key is provided stored within the circuit and a second key is read from the protective member as described above.
- the decryption key used to encrypt or decrypt data is produced as a joint function of these two keys (for example a logical combination such as an XOR combination).
- Figure 12A is a pictorial illustration of a packaged electrical circuit assembly constructed and operative in accordance with an alternative embodiment
- Figure 18 is a block diagram illustrating in greater detail a portion of that embodiment; and Figure 19 is a block diagram illustrating in greater detail another portion of that embodiment. Description of First Preferred Embodiment
- the apparatus further comprises a non- volatile (NV) memory 110 which, in this embodiment, is alterable (it is for example FLASH or
- the memory 110 comprises a region storing secret content data, the content of which is to be kept secret from hackers, which may comprise for example passwords, cryptographic key data, encryption or decryption programs, digital signing programs or digital signature verification programs.
- the first part of the loader program is performed and an initial key is supplied via the I O circuit 210.
- the second part of the loader program is executed.
- the loader programs reads the detected property signals 140 from the sensors 150.
- the acquisition logic 197 and cryptographic input unit 130 form a key from the detected property signals 140.
- the mixer and splitter circuits 250, 280 and the latches 230, 240 are all coupled to the read/write control pin of the CPU 100; however, the signal is inverted by inverters (not shown) on the latch 230 and splitter 280.
- the latch 230 is enabled in one direction
- the latch 240 is enabled in the other and vice versa
- the mixer 250 is controlled to route from the latch 230
- the splitter 280 is controlled to route to the latch 240, and vice versa.
- the 230 is ananged to receive data from the memory 110 and the latch 240 is ananged to receive data from the splitter 280;
- the mixer 250 is ananged to receive data from the latch 230 and supply it to the encryption/decryption circuit 260 which is ananged to decrypt it;
- the splitter 280 is ananged to route it to the latch 240 which is ananged to supply it to the CPU 100.
- the CPU places the row and column addresses on the data bus of the memory 110, which forwards the desired word to the latch 230.
- the mixer 250 forwards the word to the encryption/decryption circuit 260, which decrypts it.
- the splitter circuit (under the control of the row decoder 220), forwards the decrypted word to the latch 240 from which it is routed to the CPU 100.
- the bi-directional latch 240 receives the word to be written from the (data bus of the) CPU 100, and supplies it via the mixer 250 to the encryption/decryption circuit 260 at which it is encrypted.
- the sensors 150 are disposed covering all circuit-containing areas (or, at least, all areas containing sensitive data, or circuits allowing access thereto). They may be disposed, as in this embodiment, in a regular anay. Some sensors 150 are also provided on the other side (not shown) of the integrated circuit, to prevent unauthorised access through the circuit.
- the sensors 150 are magnetic field sensors such as Hall effect sensors, which may comprise a thin film of Indium Arsenide in an opening in the upper layer of the chip.
- the encapsulation 50 sunounds the device substrate 350 on both sides, and comprises an epoxy resin matrix 363.
- a plurality of particles 360 are provided, of various sizes, shapes and/or magnetic permeabilities. These particles may be made out of Ni-Co-Fe alloy (i.e. a Fenite alloy).
- Figure 6 shows structure of an embodiment in which local variations in the resistivity of the encapsulation are used to generate the key.
- temperature variations may cause resistivity fluctuations, so the difference between pairs of resistance measurements (each one being between a pair of the sensors) are taken at a subtract node, prior to digitisation. This reduces the temperature effect.
- the ratio, or any other differential measurement could be used.
- Fourth Embodiment - Vertical Resistance Sensing This embodiment has substantially the same structure as the last embodiment, except where differences are mentioned.
- each of the sensors 150 is selectively connectable to a supply line, via a cunent sensing resistor.
- each one in turn is connected to the supply line, and the current through each flowing through the sensor and the encapsulation to the grounded metal layer
- each of the flip flops 604 is connected to an OR gate 608, which receives the reset line from the CPU 100, and an input from a security fault detector (not shown).
- a security fault detector not shown
- each of the D type flop flops is fed from a further two way multiplexer 610, a first port of which receives the CPU clock signal and a second port of which receives a random clock signal.
- a load/run line which changes states depending on whether the chip is ananged to load data or to execute the CPU program, selects which of the two input ports of each of the first multiplexer 602 is routed to its output port.
- a further flip flop 612 has its reset line connected to the output of the OR gate 608, its input connected to the output of the multiplexer 610, and its output connected to the control input of the multiplexers 606 so as to select which of the two input ports is routed to the output thereof.
- the flip flop 612 alternates between the genuine and inverted outputs of the bank of D type flip flops 604 each clock cycle.
- Figures 12A to 12C illustrate an embodiment in which the encapsulation 50 contains, in addition to a plurality of randomly distributed property-modifying particles as described in the above embodiments, a plurality of microcapsules containing one or more encapsulated substances
- capsules of first and second different substances 500, 510 may be provided, which will react together on contact to produce a chain reaction that will rupture further microcapsules.
- Figure 12B shows an attempt to mechanically open the chip encapsulation
- Figure 12C shows that, as a result, capsules 500 and 510 are ruptured and come into contact with each other, setting off a two part exothermic reaction which then ruptures further encapsulations and thus propagates through the encapsulation 50. This produces a substantial alternation in the parameters measured by the sensors 150, destroying the encryption key.
- the light sources may conveniently be light emitting diodes (LEDs).
- the anay of sensors 150 in this embodiment are photosensors.
- the encapsulation 50 of this embodiment is sunounded, preferably completely, by a bonded-on, hard outer covering 540 which is light reflective on the inside and does not allow the entry of light from the outside.
- a bonded-on, hard outer covering 540 which is light reflective on the inside and does not allow the entry of light from the outside.
- the light sensed by the sensors 150 is unaffected by external light conditions. Due to the reflectance of the hard coating 540, attempts to interfere with or remove the coating will result in changes to the light sensed by the sensors 150.
- Figure 13B shows the effects of intrusively opening the apparatus. This creates an opening 570, causing rays such as the ray 560 to pass out through the opening 570 rather than be internally reflected. Thus, the environment sensed by the sensor 565 has now changed, changing the key and thus rendering decryption impossible.
- memory 110 is a read only memory (ROM). Data is provided within the read only memory 110 in encrypted form, encrypted using a first predetermined encryption key. The first encryption key is then stored, in the clear, in the second memory 111 which is writeable, non- volatile, memory (e.g. Flash or EEPROM).
- ROM read only memory
- pairing key nor the shell key are keys in a strict sense, since they are not actually used to encrypt or decrypt data themselves, but the pairing key should be generated as if it were a key). Thus, even if the scanned values could be reconstructed by a hacker, the key used to decrypt data cannot be derived without the pairing key.
- the KSU 704 provides a standard interface to the KMU; that is to say, it includes all the necessary components for whichever types of sensors it is to be used with and converts their outputs to a standard digital form.
- any customisation of the apparatus of this embodiment for different sensor systems is concentrated only in the sensors 150 and KSU 704.
- the KMU 704 is ananged, after each scan of the sensor bus 708, to compare the measured encapsulation properties with the fingerprint, by applying the fingerprint function 806 to the contents of the shell key register
- the sensors are beta detectors (which may be x-ray detectors) placed at many locations.
- the detectors will receive a complex pattern of beta rays generated by the chip case. As before, any attempt at penetration will change the key produced from the sensors radiation levels. The amount of radiation generated will be less than naturally occuning cosmic rays.
- the chip may be sunounded with some radiation absorbing substance, such as a thin layer of lead, or a layer of epoxy mixed with Barium Sulphate
- some radiation absorbing substance such as a thin layer of lead, or a layer of epoxy mixed with Barium Sulphate
- varying particles of fenoelectric materials may be provided in the matrix of the layer 50, and an electric field applied across the layer 50 by plate electrodes. The field is modified locally by the particles, and this can be sensed by sensors similar to those used in the capacitative embodiment above.
- varying particles of magnetised fenomagnetic materials may be used to generate a set of local magnetic fields sensed by Hall effect sensors.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Condensed Matter Physics & Semiconductors (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Semiconductor Integrated Circuits (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001550810A JP2003519852A (en) | 1999-12-30 | 2000-12-27 | Tamper-proof encapsulation of integrated circuits |
AU23895/01A AU783858B2 (en) | 1999-12-30 | 2000-12-27 | Anti tamper encapsulation for an integrated circuit |
EP00987594A EP1243027A1 (en) | 1999-12-30 | 2000-12-27 | Anti tamper encapsulation for an integrated circuit |
CA002395656A CA2395656A1 (en) | 1999-12-30 | 2000-12-27 | Anti tamper encapsulation for an integrated circuit |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17399499P | 1999-12-30 | 1999-12-30 | |
US60/173,994 | 1999-12-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001050530A1 true WO2001050530A1 (en) | 2001-07-12 |
Family
ID=22634377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2000/002021 WO2001050530A1 (en) | 1999-12-30 | 2000-12-27 | Anti tamper encapsulation for an integrated circuit |
Country Status (8)
Country | Link |
---|---|
US (1) | US7005733B2 (en) |
EP (1) | EP1243027A1 (en) |
JP (1) | JP2003519852A (en) |
KR (1) | KR100687071B1 (en) |
CN (1) | CN1433576A (en) |
AU (1) | AU783858B2 (en) |
CA (1) | CA2395656A1 (en) |
WO (1) | WO2001050530A1 (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002015270A2 (en) * | 2000-08-17 | 2002-02-21 | Infineon Technologies Ag | Seal for authenticating objects and a method for producing and verifying said seal |
EP1283458A2 (en) * | 2001-08-08 | 2003-02-12 | Kabushiki Kaisha Toshiba | Tamper resistant microprocessor using fast context switching |
JP2003198528A (en) * | 2001-11-30 | 2003-07-11 | Stmicroelectronics Sa | Diversification of single integrated circuit identifier |
WO2004036649A1 (en) * | 2002-10-11 | 2004-04-29 | Infineon Technologies Ag | Attack protected chip |
WO2003090259A3 (en) * | 2002-04-16 | 2004-07-08 | Massachusetts Inst Technology | Authentication of integrated circuits |
FR2859805A1 (en) * | 2003-09-12 | 2005-03-18 | Arjo Wiggins Secutity Sas | Security document such as banknote or passport has fibrous layer incorporating electronic chip that is altered by attempted access to data |
EP1533845A1 (en) * | 2002-05-31 | 2005-05-25 | Pioneer Corporation | Semiconductor memory element and its lifetime operation starting device |
US7498644B2 (en) | 2002-06-04 | 2009-03-03 | Nds Limited | Prevention of tampering in electronic devices |
GB2452763A (en) * | 2007-09-12 | 2009-03-18 | Seiko Epson Corp | Smart-card chip with organic semiconductor surface layer for detecting invasive attack |
US7564345B2 (en) | 2004-11-12 | 2009-07-21 | Verayo, Inc. | Volatile device keys and applications thereof |
EP1499905B1 (en) * | 2002-04-09 | 2010-02-24 | Nxp B.V. | Method and arrangement for protecting a chip and checking its authenticity |
WO2010059266A1 (en) * | 2008-11-19 | 2010-05-27 | Sony Ericsson Mobile Communications Ab | System and method for protecting circuit boards |
US7732321B2 (en) | 2004-05-17 | 2010-06-08 | Nds Limited | Method for shielding integrated circuits |
US7966666B2 (en) | 2006-01-24 | 2011-06-21 | Nds Limited | Chip attack protection |
EP2082517A4 (en) * | 2006-10-17 | 2011-09-28 | Semtek Innovative Solutions Inc | Encrypted token transactions |
JP2011243231A (en) * | 2002-10-09 | 2011-12-01 | Intel Corp | Capsulation of highly reliable platform module function by tcpa within server management co-processor subsystem |
US8074082B2 (en) * | 2004-10-08 | 2011-12-06 | Aprolase Development Co., Llc | Anti-tamper module |
US8630410B2 (en) | 2006-01-24 | 2014-01-14 | Verayo, Inc. | Signal generator based device security |
US8657191B2 (en) | 2007-10-18 | 2014-02-25 | Nxp B.V. | Magnetic detection of back-side layer |
US8782396B2 (en) | 2007-09-19 | 2014-07-15 | Verayo, Inc. | Authentication with physical unclonable functions |
WO2019055307A1 (en) | 2017-09-15 | 2019-03-21 | Cryptography Research, Inc. | Packaging techniques for backside mesh connectivity |
WO2020058686A1 (en) * | 2018-09-19 | 2020-03-26 | Blueskytec Ltd | Electronic anti-tamper device |
EP4036767A1 (en) * | 2021-01-28 | 2022-08-03 | Continental Automotive Technologies GmbH | Arrangement comprising a multi-layer printed circuit board and method for operating a multi-layer printed circuit board |
US11422111B2 (en) | 2017-12-07 | 2022-08-23 | Bae Systems Plc | Integrity monitor |
US20220271931A1 (en) * | 2019-07-04 | 2022-08-25 | Basf Se | New method for pseudo-random number generation for information encryption |
EP4206965A1 (en) * | 2021-12-30 | 2023-07-05 | Moxa Inc. | Computer system for failing a secure boot in a case tampering event |
Families Citing this family (222)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7600131B1 (en) * | 1999-07-08 | 2009-10-06 | Broadcom Corporation | Distributed processing in a cryptography acceleration chip |
AU2001253818A1 (en) * | 2000-02-14 | 2001-08-20 | Christina Alvarez | Security module system, apparatus and process |
JP4683442B2 (en) * | 2000-07-13 | 2011-05-18 | 富士通フロンテック株式会社 | Processing apparatus and integrated circuit |
US6901343B2 (en) * | 2001-01-10 | 2005-05-31 | Matsushita Electric Industrial Co., Ltd. | Multilayer board in which wiring of signal line that requires tamper-resistance is covered by component or foil, design apparatus, method, and program for the multilayer board, and medium recording the program |
WO2002071231A1 (en) * | 2001-02-15 | 2002-09-12 | Nokia Corporation | Method and arrangement for protecting information |
FR2823398B1 (en) * | 2001-04-04 | 2003-08-15 | St Microelectronics Sa | EXTRACTION OF PRIVATE DATA FOR AUTHENTICATION OF AN INTEGRATED CIRCUIT |
DE10124139A1 (en) * | 2001-05-17 | 2002-11-21 | Philips Corp Intellectual Pty | Method for securing data transfer between a CPU and ROM memory, used in a chip card or similar, has an additional individual encryption code so that if a first code is known the memory remains secure |
FR2825873A1 (en) * | 2001-06-11 | 2002-12-13 | St Microelectronics Sa | PROTECTED STORAGE OF DATA IN AN INTEGRATED CIRCUIT |
US7266703B2 (en) * | 2001-06-13 | 2007-09-04 | Itt Manufacturing Enterprises, Inc. | Single-pass cryptographic processor and method |
KR20040060993A (en) * | 2001-11-28 | 2004-07-06 | 코닌클리즈케 필립스 일렉트로닉스 엔.브이. | Semiconductor device, card, system, and methods of initializing and checking the authenticity and the identity of the semiconductor device |
US7309907B2 (en) | 2001-11-28 | 2007-12-18 | Nxp B.V. | Semiconductor device card methods of initializing checking the authenticity and the identity thereof |
KR100445406B1 (en) * | 2001-11-30 | 2004-08-25 | 주식회사 하이닉스반도체 | Apparatus for encrypting the data and method therefor |
DE10162307A1 (en) * | 2001-12-19 | 2003-07-03 | Philips Intellectual Property | Production of mask-programmed ROMs, using a mask containing several systems, whereby encryption using the mask is carried out so that the produced systems have different keys |
GB0202431D0 (en) * | 2002-02-02 | 2002-03-20 | F Secure Oyj | Method and apparatus for encrypting data |
JP2003280754A (en) * | 2002-03-25 | 2003-10-02 | Nec Corp | Hidden source program, source program converting method and device and source converting program |
DE10223176B3 (en) * | 2002-05-24 | 2004-01-22 | Infineon Technologies Ag | Integrated circuit with safety-critical circuit components |
JP2004023351A (en) * | 2002-06-14 | 2004-01-22 | Oki Electric Ind Co Ltd | Method for securing program of microcomputer |
JP2004070499A (en) * | 2002-08-02 | 2004-03-04 | Fujitsu Ltd | Memory device, and enciphering/decoding method |
US7853788B2 (en) * | 2002-10-08 | 2010-12-14 | Koolspan, Inc. | Localized network authentication and security using tamper-resistant keys |
CN1717893B (en) * | 2002-10-28 | 2010-05-05 | 诺基亚有限公司 | Device keys |
CN100472648C (en) | 2002-12-18 | 2009-03-25 | Nxp股份有限公司 | Tamper-resistant packaging and approach |
US20040123123A1 (en) * | 2002-12-18 | 2004-06-24 | Buer Mark L. | Methods and apparatus for accessing security association information in a cryptography accelerator |
ES2400240T3 (en) * | 2002-12-18 | 2013-04-08 | Crocus Technology, Inc. | Wrap and focus for tamper resistant integrated circuits |
US7434043B2 (en) | 2002-12-18 | 2008-10-07 | Broadcom Corporation | Cryptography accelerator data routing unit |
US7568110B2 (en) | 2002-12-18 | 2009-07-28 | Broadcom Corporation | Cryptography accelerator interface decoupling from cryptography processing cores |
WO2004055824A2 (en) | 2002-12-18 | 2004-07-01 | Koninklijke Philips Electronics N.V. | Method and device for protection of an mram device against tampering |
US7712147B2 (en) * | 2002-12-18 | 2010-05-04 | Nxp B.V. | Method and device for protection of an mram device against tampering |
JP2006512779A (en) * | 2002-12-18 | 2006-04-13 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Hardware security device for magnetic memory cell |
US20040123120A1 (en) * | 2002-12-18 | 2004-06-24 | Broadcom Corporation | Cryptography accelerator input interface data handling |
US8210120B2 (en) * | 2003-01-10 | 2012-07-03 | Microsemi Corporation | Systems and methods for building tamper resistant coatings |
CN100390700C (en) * | 2003-01-14 | 2008-05-28 | Nxp股份有限公司 | Tamper-resistant packaging and approach using magnetically-set data |
US7758911B2 (en) | 2003-05-08 | 2010-07-20 | Honeywell International Inc. | Microelectronic security coatings |
US8060756B2 (en) * | 2003-08-07 | 2011-11-15 | Rao G R Mohan | Data security and digital rights management system |
US7366302B2 (en) * | 2003-08-25 | 2008-04-29 | Sony Corporation | Apparatus and method for an iterative cryptographic block |
US20050071656A1 (en) * | 2003-09-25 | 2005-03-31 | Klein Dean A. | Secure processor-based system and method |
JP4462903B2 (en) * | 2003-11-18 | 2010-05-12 | パナソニック株式会社 | Semiconductor wafer |
DE102004014435A1 (en) * | 2004-03-24 | 2005-11-17 | Siemens Ag | Arrangement with an integrated circuit |
US20070130425A1 (en) * | 2004-05-25 | 2007-06-07 | Eiji Ueda | Semiconductor memory card |
EP1617472A1 (en) * | 2004-07-16 | 2006-01-18 | Axalto SA | An active protection device for protecting a circuit against mechanical and electromagnetic attack |
US7202782B2 (en) * | 2004-08-04 | 2007-04-10 | Agere Systems Inc. | Method and apparatus for disabling an integrated circuit (IC) when an attempt is made to bypass security on the IC |
US7343496B1 (en) * | 2004-08-13 | 2008-03-11 | Zilog, Inc. | Secure transaction microcontroller with secure boot loader |
US7323986B2 (en) * | 2004-09-03 | 2008-01-29 | Gore Enterprise Holdings, Inc. | Reusable tamper respondent enclosure |
US7818574B2 (en) * | 2004-09-10 | 2010-10-19 | International Business Machines Corporation | System and method for providing dynamically authorized access to functionality present on an integrated circuit chip |
JP2008517508A (en) * | 2004-10-18 | 2008-05-22 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Secure sensor chip |
US20060136717A1 (en) | 2004-12-20 | 2006-06-22 | Mark Buer | System and method for authentication via a proximate device |
US8295484B2 (en) | 2004-12-21 | 2012-10-23 | Broadcom Corporation | System and method for securing data from a remote input device |
EP1691413A1 (en) * | 2005-02-11 | 2006-08-16 | Axalto SA | Tamper-resistant electronic component |
US7546634B2 (en) * | 2005-04-08 | 2009-06-09 | Victor Chuan-Chen Wu | Encryption removable storage system |
DE102005024379A1 (en) * | 2005-05-27 | 2006-11-30 | Universität Mannheim | A method for generating and / or embossing a recoverable cryptographic key in the production of a topographical structure |
WO2006129738A1 (en) * | 2005-05-30 | 2006-12-07 | Semiconductor Energy Laboratory Co., Ltd. | Semiconductor device and method for operating the same |
WO2018045179A1 (en) * | 2016-09-02 | 2018-03-08 | Frederick Flitsch | Customized smart devices and touchscreen devices and cleanspace manufacturing methods to make them |
US11011396B2 (en) | 2013-01-05 | 2021-05-18 | Frederick A. Flitsch | Customized smart devices and touchscreen devices and cleanspace manufacturing methods to make them |
US11024527B2 (en) | 2005-06-18 | 2021-06-01 | Frederick A. Flitsch | Methods and apparatus for novel fabricators with Cleanspace |
KR100641297B1 (en) * | 2005-08-18 | 2006-11-02 | 삼성전자주식회사 | Semiconductor device using rom scrambling method, and operating method of the device |
US7719419B2 (en) * | 2005-11-02 | 2010-05-18 | Honeywell International Inc. | Intrusion detection using pseudo-random binary sequences |
FR2893436B1 (en) * | 2005-11-15 | 2008-02-15 | Oberthur Card Syst Sa | SECURING BETWEEN ELECTRONIC COMPONENTS OF A PORTABLE SECURE ELECTRONIC ENTITY |
US7436316B2 (en) * | 2006-01-05 | 2008-10-14 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US7388486B2 (en) * | 2006-01-05 | 2008-06-17 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US7495554B2 (en) * | 2006-01-11 | 2009-02-24 | Honeywell International Inc. | Clamshell protective encasement |
KR101194838B1 (en) * | 2006-01-20 | 2012-10-25 | 삼성전자주식회사 | High security mask ROM and data scramble/descramble method thereof |
US20070221117A1 (en) * | 2006-03-23 | 2007-09-27 | Honeywell International Inc. | Active protection for closed systems |
US20070247182A1 (en) * | 2006-03-31 | 2007-10-25 | Beatty Timothy S | Protection of security key information |
CN101421971A (en) * | 2006-04-11 | 2009-04-29 | 皇家飞利浦电子股份有限公司 | Attack detection with coating puf |
EP2016593B1 (en) * | 2006-04-20 | 2014-11-05 | NVE Corporation | Enclosure tamper detection and protection |
US20070279969A1 (en) * | 2006-06-02 | 2007-12-06 | Raytheon Company | Intrusion detection apparatus and method |
GB0615392D0 (en) * | 2006-08-03 | 2006-09-13 | Wivenhoe Technology Ltd | Pseudo random number circuitry |
US8076185B1 (en) * | 2006-08-23 | 2011-12-13 | Rockwell Collins, Inc. | Integrated circuit protection and ruggedization coatings and methods |
US8581108B1 (en) | 2006-08-23 | 2013-11-12 | Rockwell Collins, Inc. | Method for providing near-hermetically coated integrated circuit assemblies |
US7915527B1 (en) | 2006-08-23 | 2011-03-29 | Rockwell Collins, Inc. | Hermetic seal and hermetic connector reinforcement and repair with low temperature glass coatings |
US8617913B2 (en) | 2006-08-23 | 2013-12-31 | Rockwell Collins, Inc. | Alkali silicate glass based coating and method for applying |
US7671324B2 (en) * | 2006-09-27 | 2010-03-02 | Honeywell International Inc. | Anti-tamper enclosure system comprising a photosensitive sensor and optical medium |
US7948783B2 (en) * | 2006-11-24 | 2011-05-24 | Nec Corporation | Mram |
US20080129501A1 (en) * | 2006-11-30 | 2008-06-05 | Honeywell International Inc. | Secure chassis with integrated tamper detection sensor |
US8279075B2 (en) * | 2006-11-30 | 2012-10-02 | Honeywell International Inc. | Card slot anti-tamper protection system |
US7796036B2 (en) * | 2006-11-30 | 2010-09-14 | Honeywell International Inc. | Secure connector with integrated tamper sensors |
US8117445B2 (en) * | 2006-12-20 | 2012-02-14 | Spansion Llc | Near field communication, security and non-volatile memory integrated sub-system for embedded portable applications |
CN101009215A (en) * | 2007-01-26 | 2007-08-01 | 四川登巅微电子有限公司 | A generation method of the integrated circuit random sequence number |
US8284387B2 (en) * | 2007-02-08 | 2012-10-09 | Honeywell International Inc. | Methods and systems for recognizing tamper events |
WO2008099348A2 (en) * | 2007-02-16 | 2008-08-21 | Nxp B.V. | Semiconductor device identifier generation |
EP2115652B1 (en) * | 2007-02-20 | 2019-04-10 | Nxp B.V. | Semiconductor device with backside tamper protection |
EP2135254B1 (en) | 2007-03-09 | 2016-05-25 | NVE Corporation | Stressed magnetoresistive tamper detection devices |
US7710286B1 (en) | 2007-03-30 | 2010-05-04 | Maxim Integrated Products, Inc. | Intrusion detection using a conductive material |
US7868441B2 (en) * | 2007-04-13 | 2011-01-11 | Maxim Integrated Products, Inc. | Package on-package secure module having BGA mesh cap |
US7923830B2 (en) * | 2007-04-13 | 2011-04-12 | Maxim Integrated Products, Inc. | Package-on-package secure module having anti-tamper mesh in the substrate of the upper package |
US8681996B2 (en) * | 2007-07-31 | 2014-03-25 | Lsi Corporation | Asymmetric key wrapping using a symmetric cipher |
US8143705B2 (en) * | 2007-08-02 | 2012-03-27 | Nxp B.V. | Tamper-resistant semiconductor device and methods of manufacturing thereof |
US7615416B1 (en) | 2007-08-31 | 2009-11-10 | Maxim Integrated Products, Inc. | Secure package with anti-tamper peripheral guard ring |
US20090060182A1 (en) * | 2007-09-04 | 2009-03-05 | Thomas Killian | Apparatus and method for enhancing the protection of media content |
US7898090B1 (en) | 2007-09-28 | 2011-03-01 | Ixys Ch Gmbh | General purpose ball grid array security cap |
EP2198384B1 (en) * | 2007-10-09 | 2012-12-05 | NDS Limited | Tamper-detecting electronic system |
DE102007051788A1 (en) | 2007-10-30 | 2009-05-14 | Giesecke & Devrient Gmbh | Semiconductor chip with a protective layer and method for operating a semiconductor chip |
WO2009091301A1 (en) * | 2008-01-16 | 2009-07-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and device for detecting the opening of a cover enclosing the device |
US8552566B1 (en) | 2008-05-30 | 2013-10-08 | Maxim Integrated Products, Inc. | Integrated circuit package having surface-mount blocking elements |
JP2011526113A (en) * | 2008-06-27 | 2011-09-29 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Apparatus, system, and method for verifying authenticity, integrity, and / or physical state of an item |
US7888776B2 (en) * | 2008-06-30 | 2011-02-15 | Texas Instruments Incorporated | Capacitor-based method for determining and characterizing scribe seal integrity and integrity loss |
US8675868B1 (en) * | 2008-07-01 | 2014-03-18 | Maxim Integrated Products, Inc. | Encrypting an address-dependent value along with code to prevent execution or use of moved code |
US20100026337A1 (en) * | 2008-07-29 | 2010-02-04 | International Business Machines Corporation | Interdependent Microchip Functionality for Defeating Exploitation Attempts |
US7701244B2 (en) * | 2008-07-29 | 2010-04-20 | International Business Machines Corporation | False connection for defeating microchip exploitation |
US9003559B2 (en) * | 2008-07-29 | 2015-04-07 | International Business Machines Corporation | Continuity check monitoring for microchip exploitation detection |
US7884625B2 (en) * | 2008-07-29 | 2011-02-08 | International Business Machines Corporation | Capacitance structures for defeating microchip tampering |
US8332659B2 (en) * | 2008-07-29 | 2012-12-11 | International Business Machines Corporation | Signal quality monitoring to defeat microchip exploitation |
US8214657B2 (en) * | 2008-07-29 | 2012-07-03 | International Business Machines Corporation | Resistance sensing for defeating microchip exploitation |
US7952478B2 (en) * | 2008-07-29 | 2011-05-31 | International Business Machines Corporation | Capacitance-based microchip exploitation detection |
US8172140B2 (en) * | 2008-07-29 | 2012-05-08 | International Business Machines Corporation | Doped implant monitoring for microchip tamper detection |
US8683210B2 (en) * | 2008-11-21 | 2014-03-25 | Verayo, Inc. | Non-networked RFID-PUF authentication |
FR2940485B1 (en) * | 2008-12-24 | 2011-03-25 | Oberthur Technologies | METHOD FOR STORING DATA IN AN ELECTRONIC ENTITY AND ELECTRONIC ENTITY THEREFOR |
US8860197B2 (en) * | 2008-12-31 | 2014-10-14 | Arizona Board Of Regents, A Body Corporate Of The State Of Arizona Acting For And On Behalf Of Arizona State University | Integrated circuits secure from invasion and methods of manufacturing the same |
US8455990B2 (en) * | 2009-02-25 | 2013-06-04 | Conexant Systems, Inc. | Systems and methods of tamper proof packaging of a semiconductor device |
US8468186B2 (en) * | 2009-08-05 | 2013-06-18 | Verayo, Inc. | Combination of values from a pseudo-random source |
US8811615B2 (en) * | 2009-08-05 | 2014-08-19 | Verayo, Inc. | Index-based coding with a pseudo-random source |
FR2955189B1 (en) | 2009-11-12 | 2012-03-09 | St Microelectronics Rousset | SECURE PROCESS FOR PROCESSING MEMORIZED CONTENT WITHIN A COMPONENT, AND CORRESPONDING COMPONENT |
US8812875B1 (en) | 2010-04-12 | 2014-08-19 | Stephen Melvin | Virtual self-destruction of stored information |
US8429420B1 (en) | 2010-04-12 | 2013-04-23 | Stephen Waller Melvin | Time-based key management for encrypted information |
US8275996B1 (en) | 2010-04-12 | 2012-09-25 | Stephen Waller Melvin | Incremental encryption of stored information |
US8213207B2 (en) | 2010-08-25 | 2012-07-03 | Honeywell International Inc. | Printed board assembly movement detection |
WO2012122994A1 (en) * | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
EP2512061A1 (en) * | 2011-04-15 | 2012-10-17 | Hanscan IP B.V. | System for conducting remote biometric operations |
US9417894B1 (en) | 2011-06-15 | 2016-08-16 | Ryft Systems, Inc. | Methods and apparatus for a tablet computer system incorporating a reprogrammable circuit module |
US10678951B2 (en) * | 2011-10-24 | 2020-06-09 | Maxim Integrated Products, Inc. | Tamper detection countermeasures to deter physical attack on a security ASIC |
CN102521532A (en) * | 2011-11-30 | 2012-06-27 | 深圳市同方多媒体科技有限公司 | Protection method for digital copyright based on encryption chip |
US8752210B2 (en) | 2012-01-10 | 2014-06-10 | International Business Machines Corporation | Implementing data theft prevention |
WO2013126422A1 (en) * | 2012-02-21 | 2013-08-29 | Microchip Technology Incorporated | Cryptographic transmission system using key encryption key |
US8797059B2 (en) | 2012-03-01 | 2014-08-05 | International Business Machines Corporation | Implementing carbon nanotube based sensors for cryptographic applications |
US8854870B2 (en) | 2012-03-13 | 2014-10-07 | Honeywell International Inc. | Magnetoresistive random access memory (MRAM) die including an integrated magnetic security structure |
US8811072B2 (en) | 2012-03-13 | 2014-08-19 | Honeywell International Inc. | Magnetoresistive random access memory (MRAM) package including a multilayer magnetic security structure |
US8909942B1 (en) * | 2012-03-30 | 2014-12-09 | Western Digital Technologies, Inc. | MRAM-based security for data storage systems |
EP2665094A1 (en) * | 2012-05-15 | 2013-11-20 | Nxp B.V. | Tamper resistant IC |
US9436940B2 (en) * | 2012-07-09 | 2016-09-06 | Maxim Integrated Products, Inc. | Embedded secure element for authentication, storage and transaction within a mobile terminal |
US9355228B2 (en) * | 2012-07-13 | 2016-05-31 | Angel Secure Networks, Inc. | System and method for policy driven protection of remote computing environments |
GB2507954B (en) * | 2012-10-13 | 2018-07-04 | Korala Associates Ltd | A user terminal system and method |
US8819842B2 (en) * | 2012-11-20 | 2014-08-26 | International Business Machines Corporation | Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention |
CN103605933A (en) * | 2012-12-13 | 2014-02-26 | 深圳市证通电子股份有限公司 | Key information storing method and device based on standard unit technology |
US11462437B2 (en) | 2013-01-05 | 2022-10-04 | Frederick A. Flitsch | Customized smart devices and touchscreen devices and cleanspace manufacturing methods to make them |
US9323957B2 (en) | 2013-03-01 | 2016-04-26 | Marvell World Trade Ltd. | Anti-tamper system based on dual random bits generators for integrated circuits |
US9507968B2 (en) | 2013-03-15 | 2016-11-29 | Cirque Corporation | Flying sense electrodes for creating a secure cage for integrated circuits and pathways |
JP6126425B2 (en) * | 2013-03-27 | 2017-05-10 | 株式会社日立ハイテクサイエンス | Focused ion beam apparatus and control method thereof |
DE102013205729A1 (en) | 2013-03-28 | 2014-10-02 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Device and method with a carrier with circuit structures |
US9245202B2 (en) | 2013-06-06 | 2016-01-26 | International Business Machines Corporation | Tamper detection with microcaspule rupture |
DE102013014587B4 (en) * | 2013-08-29 | 2017-10-19 | Fachhochschule Schmalkalden | Method for IT protection of security-relevant data and its processing |
WO2015061673A1 (en) * | 2013-10-25 | 2015-04-30 | Roximity, Inc. | Beacon security |
US9342710B2 (en) | 2013-11-21 | 2016-05-17 | Nxp B.V. | Electronic tamper detection |
DE102013112931A1 (en) | 2013-11-22 | 2015-05-28 | Infineon Technologies Ag | A chip arrangement and method for checking whether a chip is arranged in a designated chip carrier |
DE202013011130U1 (en) | 2013-12-11 | 2014-01-10 | Giesecke & Devrient Gmbh | chip system |
US9729320B2 (en) * | 2014-02-25 | 2017-08-08 | Cavium, Inc. | Apparatus and method for software enabled access to protected hardware resources |
US9747967B2 (en) | 2014-09-26 | 2017-08-29 | Intel Corporation | Magnetic field-assisted memory operation |
US10534937B2 (en) * | 2014-10-20 | 2020-01-14 | Bedrock Automation Platforms Inc. | Tamper resistant module for industrial control system |
DE102014016644A1 (en) * | 2014-11-11 | 2016-05-12 | Giesecke & Devrient Gmbh | Method for protection against unauthorized access |
US20160174388A1 (en) | 2014-12-15 | 2016-06-16 | International Business Machines Corporation | Printed circuit board security using embedded photodetector circuit |
WO2016099644A1 (en) * | 2014-12-19 | 2016-06-23 | Private Machines Inc. | Systems and methods for using extended hardware security modules |
US20160188495A1 (en) * | 2014-12-26 | 2016-06-30 | Intel Corporation | Event triggered erasure for data security |
US10007811B2 (en) | 2015-02-25 | 2018-06-26 | Private Machines Inc. | Anti-tamper system |
US9560737B2 (en) | 2015-03-04 | 2017-01-31 | International Business Machines Corporation | Electronic package with heat transfer element(s) |
US10325131B2 (en) * | 2015-06-30 | 2019-06-18 | Synaptics Incorporated | Active matrix capacitive fingerprint sensor for display integration based on charge sensing by a 2-TFT pixel architecture |
US10426037B2 (en) | 2015-07-15 | 2019-09-24 | International Business Machines Corporation | Circuitized structure with 3-dimensional configuration |
EP3147830B1 (en) | 2015-09-23 | 2020-11-18 | Nxp B.V. | Protecting an integrated circuit |
US10098235B2 (en) | 2015-09-25 | 2018-10-09 | International Business Machines Corporation | Tamper-respondent assemblies with region(s) of increased susceptibility to damage |
US9591776B1 (en) | 2015-09-25 | 2017-03-07 | International Business Machines Corporation | Enclosure with inner tamper-respondent sensor(s) |
US10172239B2 (en) | 2015-09-25 | 2019-01-01 | International Business Machines Corporation | Tamper-respondent sensors with formed flexible layer(s) |
US9911012B2 (en) | 2015-09-25 | 2018-03-06 | International Business Machines Corporation | Overlapping, discrete tamper-respondent sensors |
US9894749B2 (en) | 2015-09-25 | 2018-02-13 | International Business Machines Corporation | Tamper-respondent assemblies with bond protection |
US9924591B2 (en) | 2015-09-25 | 2018-03-20 | International Business Machines Corporation | Tamper-respondent assemblies |
US10175064B2 (en) | 2015-09-25 | 2019-01-08 | International Business Machines Corporation | Circuit boards and electronic packages with embedded tamper-respondent sensor |
US9578764B1 (en) | 2015-09-25 | 2017-02-21 | International Business Machines Corporation | Enclosure with inner tamper-respondent sensor(s) and physical security element(s) |
US20170100862A1 (en) | 2015-10-09 | 2017-04-13 | Lexmark International, Inc. | Injection-Molded Physical Unclonable Function |
US10410779B2 (en) | 2015-10-09 | 2019-09-10 | Lexmark International, Inc. | Methods of making physical unclonable functions having magnetic and non-magnetic particles |
US10143090B2 (en) | 2015-10-19 | 2018-11-27 | International Business Machines Corporation | Circuit layouts of tamper-respondent sensors |
US9978231B2 (en) | 2015-10-21 | 2018-05-22 | International Business Machines Corporation | Tamper-respondent assembly with protective wrap(s) over tamper-respondent sensor(s) |
US9565021B1 (en) | 2015-11-16 | 2017-02-07 | International Business Machines Corporation | Shape actuation encapsulant of a cryptographic module |
US9913389B2 (en) | 2015-12-01 | 2018-03-06 | International Business Corporation Corporation | Tamper-respondent assembly with vent structure |
US10327343B2 (en) | 2015-12-09 | 2019-06-18 | International Business Machines Corporation | Applying pressure to adhesive using CTE mismatch between components |
US9555606B1 (en) | 2015-12-09 | 2017-01-31 | International Business Machines Corporation | Applying pressure to adhesive using CTE mismatch between components |
US9554477B1 (en) | 2015-12-18 | 2017-01-24 | International Business Machines Corporation | Tamper-respondent assemblies with enclosure-to-board protection |
JP6690238B2 (en) | 2015-12-28 | 2020-04-28 | 富士通株式会社 | Electronic circuit and latch circuit for external action detection |
US10171498B2 (en) | 2016-02-19 | 2019-01-01 | International Business Machines Corporation | Secure crypto module including electrical shorting security layers |
US9916744B2 (en) | 2016-02-25 | 2018-03-13 | International Business Machines Corporation | Multi-layer stack with embedded tamper-detect protection |
US9904811B2 (en) | 2016-04-27 | 2018-02-27 | International Business Machines Corporation | Tamper-proof electronic packages with two-phase dielectric fluid |
US9913370B2 (en) | 2016-05-13 | 2018-03-06 | International Business Machines Corporation | Tamper-proof electronic packages formed with stressed glass |
US9881880B2 (en) | 2016-05-13 | 2018-01-30 | International Business Machines Corporation | Tamper-proof electronic packages with stressed glass component substrate(s) |
DE102016109960A1 (en) * | 2016-05-31 | 2017-11-30 | Infineon Technologies Ag | Semiconductor package, smart card and method of manufacturing a semiconductor package |
US9858776B1 (en) | 2016-06-28 | 2018-01-02 | International Business Machines Corporation | Tamper-respondent assembly with nonlinearity monitoring |
IT201600072154A1 (en) * | 2016-07-11 | 2018-01-11 | Ibm | ELECTRONIC DEVICES WITH INDIVIDUAL SAFETY CIRCUITS |
US9665748B1 (en) | 2016-08-03 | 2017-05-30 | Lexmark International, Inc. | Magnetic helical physical unclonable function measured adjacent to flight |
US10321589B2 (en) | 2016-09-19 | 2019-06-11 | International Business Machines Corporation | Tamper-respondent assembly with sensor connection adapter |
US10299372B2 (en) | 2016-09-26 | 2019-05-21 | International Business Machines Corporation | Vented tamper-respondent assemblies |
US10271424B2 (en) | 2016-09-26 | 2019-04-23 | International Business Machines Corporation | Tamper-respondent assemblies with in situ vent structure(s) |
US9818871B1 (en) | 2016-10-20 | 2017-11-14 | Cisco Technology, Inc. | Defense layer against semiconductor device thinning |
US10621351B2 (en) | 2016-11-01 | 2020-04-14 | Raptor Engineering, LLC. | Systems and methods for tamper-resistant verification of firmware with a trusted platform module |
US9999124B2 (en) | 2016-11-02 | 2018-06-12 | International Business Machines Corporation | Tamper-respondent assemblies with trace regions of increased susceptibility to breaking |
US10102466B2 (en) * | 2016-12-09 | 2018-10-16 | Lexmark International, Inc. | Magnetic keys having a plurality of magnet layers with holes |
US10212300B2 (en) | 2016-12-09 | 2019-02-19 | Lexmark International, Inc. | Magnetic keys having a plurality of magnetic plates |
US9859226B1 (en) | 2016-12-13 | 2018-01-02 | International Business Machines Corporation | Core-shell particles for anti-tampering applications |
US10327329B2 (en) | 2017-02-13 | 2019-06-18 | International Business Machines Corporation | Tamper-respondent assembly with flexible tamper-detect sensor(s) overlying in-situ-formed tamper-detect sensor |
GB2560716B (en) * | 2017-03-20 | 2022-05-25 | Blueskytec Ltd | Electronic anti-tamper device |
US10696899B2 (en) | 2017-05-09 | 2020-06-30 | International Business Machines Corporation | Light emitting shell in multi-compartment microcapsules |
US10357921B2 (en) | 2017-05-24 | 2019-07-23 | International Business Machines Corporation | Light generating microcapsules for photo-curing |
US10900908B2 (en) * | 2017-05-24 | 2021-01-26 | International Business Machines Corporation | Chemiluminescence for tamper event detection |
US10392452B2 (en) | 2017-06-23 | 2019-08-27 | International Business Machines Corporation | Light generating microcapsules for self-healing polymer applications |
US11347901B2 (en) | 2017-06-28 | 2022-05-31 | Tetramer Technologies, Llc | Frangible security device |
DE102017009315B4 (en) | 2017-10-06 | 2019-11-21 | Sergej Gertje | Protection of automation programs against reverse development |
US20190139909A1 (en) * | 2017-11-09 | 2019-05-09 | Lexmark International, Inc. | Physical Unclonable Functions in Integrated Circuit Chip Packaging for Security |
US10381315B2 (en) * | 2017-11-16 | 2019-08-13 | Samsung Electronics Co., Ltd. | Method and system for providing a reverse-engineering resistant hardware embedded security module |
US10306753B1 (en) | 2018-02-22 | 2019-05-28 | International Business Machines Corporation | Enclosure-to-board interface with tamper-detect circuit(s) |
US11122682B2 (en) | 2018-04-04 | 2021-09-14 | International Business Machines Corporation | Tamper-respondent sensors with liquid crystal polymer layers |
EP3550623B1 (en) | 2018-04-06 | 2020-07-29 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Puf-film and method for producing the same |
EP3550466B1 (en) * | 2018-04-06 | 2023-08-02 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Puf-film and method for producing the same |
EP3550475A1 (en) | 2018-04-06 | 2019-10-09 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Puf-film and method for producing the same |
DE102018209579B9 (en) | 2018-06-14 | 2024-03-14 | Infineon Technologies Ag | ELECTRONIC DEVICE AND METHOD FOR MAKING THE SAME |
WO2020177082A1 (en) * | 2019-03-05 | 2020-09-10 | 华为技术有限公司 | Circuit for die protection, die, and integrated circuit |
CN111783171A (en) * | 2019-04-04 | 2020-10-16 | 利盟国际有限公司 | Physically unclonable function for security in integrated circuit chip packages |
CN110289244B (en) * | 2019-07-23 | 2024-07-30 | 南方电网科学研究院有限责任公司 | Cryptographic chip for preventing intrusion type attack of sensitive information |
US11139256B2 (en) | 2019-08-21 | 2021-10-05 | Micron Technology, Inc. | Tamper-resistant integrated circuits, and related methods |
US11797718B2 (en) | 2019-08-23 | 2023-10-24 | Cryptography Research, Inc. | Anti-tamper shield based on strings of series resistors |
FR3111737B1 (en) * | 2020-06-19 | 2022-07-08 | Commissariat Energie Atomique | CHIP OR BOX-SYSTEM PROTECTION USING THE GMI EFFECT |
EP3941168A1 (en) | 2020-07-14 | 2022-01-19 | ZKW Group GmbH | Vehicle module with a manipulation-detecting electronic control unit |
US11437329B2 (en) | 2020-10-14 | 2022-09-06 | Globalfoundries U.S. Inc. | Anti-tamper x-ray blocking package |
DE102021110607A1 (en) * | 2021-04-26 | 2022-10-27 | Semikron Elektronik Gmbh & Co. Kg | Device with functional component and plastic housing element and method for verifying the authenticity of such a device |
WO2022233720A1 (en) | 2021-05-06 | 2022-11-10 | Ihp Gmbh - Innovations For High Performance Microelectronics / Leibniz-Institut Für Innovative Mikroelektronik | Semiconductor device with back side protection mechanism |
EP4086950A1 (en) | 2021-05-06 | 2022-11-09 | IHP GmbH - Innovations for High Performance Microelectronics / Leibniz-Institut für innovative Mikroelektronik | Semiconductor device with back side protection mechanism |
US11815717B2 (en) | 2021-11-12 | 2023-11-14 | Globalfoundries U.S. Inc. | Photonic chip security structure |
DE102023102691A1 (en) | 2023-02-03 | 2024-08-08 | btv technologies gmbh | Method for writing data to an IC and system for carrying out the method |
EP4439365A1 (en) * | 2023-03-31 | 2024-10-02 | nCipher Security Limited | A cryptographic device |
DE102023108678A1 (en) | 2023-04-05 | 2024-10-10 | Trustnxt Gmbh | Method for signing or decrypting data with a cryptographic key and computer program product and device therefor |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4860351A (en) * | 1986-11-05 | 1989-08-22 | Ibm Corporation | Tamper-resistant packaging for protection of information stored in electronic circuitry |
US5177352A (en) * | 1991-06-06 | 1993-01-05 | The United States Of America As Represented By The United States Department Of Energy | Integrated optical tamper sensor with planar waveguide |
US5353350A (en) * | 1989-10-03 | 1994-10-04 | University Of Technology | Electro-active cradle circuits for the detection of access or penetration |
US5539828A (en) * | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
EP0743602A1 (en) * | 1995-05-18 | 1996-11-20 | Hewlett-Packard Company | Integrated circuit device with function usage control |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3347483A1 (en) * | 1983-12-29 | 1985-07-11 | GAO Gesellschaft für Automation und Organisation mbH, 8000 München | DEVICE FOR SECURING SECRET INFORMATION |
US4593384A (en) * | 1984-12-21 | 1986-06-03 | Ncr Corporation | Security device for the secure storage of sensitive data |
US5117457A (en) * | 1986-11-05 | 1992-05-26 | International Business Machines Corp. | Tamper resistant packaging for information protection in electronic circuitry |
US4933898A (en) * | 1989-01-12 | 1990-06-12 | General Instrument Corporation | Secure integrated circuit chip with conductive shield |
FR2649817B1 (en) * | 1989-07-13 | 1993-12-24 | Gemplus Card International | INTRUSION PROTECTED MICROCIRCUIT CARD |
US5027397A (en) * | 1989-09-12 | 1991-06-25 | International Business Machines Corporation | Data protection by detection of intrusion into electronic assemblies |
US5053992A (en) * | 1990-10-04 | 1991-10-01 | General Instrument Corporation | Prevention of inspection of secret data stored in encapsulated integrated circuit chip |
US5790670A (en) * | 1996-07-18 | 1998-08-04 | Citicorp Development Center, Inc. | Apparatus and method for securing electronic circuitry |
JP3440763B2 (en) * | 1996-10-25 | 2003-08-25 | 富士ゼロックス株式会社 | Encryption device, decryption device, confidential data processing device, and information processing device |
EP0964361A1 (en) * | 1998-06-08 | 1999-12-15 | International Business Machines Corporation | Protection of sensitive information contained in integrated circuit cards |
DE69937629T2 (en) * | 1998-07-07 | 2008-11-13 | Nxp B.V. | DATA CARRIER EQUIPPED WITH DATA PROCESSING OPTIONS AND CURRENT TOP STYLE SUPPRESSION POSSIBILITIES |
US6501390B1 (en) * | 1999-01-11 | 2002-12-31 | International Business Machines Corporation | Method and apparatus for securely determining aspects of the history of a good |
US6396400B1 (en) * | 1999-07-26 | 2002-05-28 | Epstein, Iii Edwin A. | Security system and enclosure to protect data contained therein |
-
2000
- 2000-12-26 US US09/745,811 patent/US7005733B2/en not_active Expired - Lifetime
- 2000-12-27 AU AU23895/01A patent/AU783858B2/en not_active Ceased
- 2000-12-27 CA CA002395656A patent/CA2395656A1/en not_active Abandoned
- 2000-12-27 CN CN00818715A patent/CN1433576A/en active Pending
- 2000-12-27 KR KR1020027008558A patent/KR100687071B1/en not_active IP Right Cessation
- 2000-12-27 EP EP00987594A patent/EP1243027A1/en not_active Withdrawn
- 2000-12-27 JP JP2001550810A patent/JP2003519852A/en active Pending
- 2000-12-27 WO PCT/IB2000/002021 patent/WO2001050530A1/en active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4860351A (en) * | 1986-11-05 | 1989-08-22 | Ibm Corporation | Tamper-resistant packaging for protection of information stored in electronic circuitry |
US5353350A (en) * | 1989-10-03 | 1994-10-04 | University Of Technology | Electro-active cradle circuits for the detection of access or penetration |
US5177352A (en) * | 1991-06-06 | 1993-01-05 | The United States Of America As Represented By The United States Department Of Energy | Integrated optical tamper sensor with planar waveguide |
US5539828A (en) * | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
EP0743602A1 (en) * | 1995-05-18 | 1996-11-20 | Hewlett-Packard Company | Integrated circuit device with function usage control |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002015270A3 (en) * | 2000-08-17 | 2002-10-24 | Infineon Technologies Ag | Seal for authenticating objects and a method for producing and verifying said seal |
WO2002015270A2 (en) * | 2000-08-17 | 2002-02-21 | Infineon Technologies Ag | Seal for authenticating objects and a method for producing and verifying said seal |
EP1283458A2 (en) * | 2001-08-08 | 2003-02-12 | Kabushiki Kaisha Toshiba | Tamper resistant microprocessor using fast context switching |
JP2003198528A (en) * | 2001-11-30 | 2003-07-11 | Stmicroelectronics Sa | Diversification of single integrated circuit identifier |
EP1499905B1 (en) * | 2002-04-09 | 2010-02-24 | Nxp B.V. | Method and arrangement for protecting a chip and checking its authenticity |
JP2011123909A (en) * | 2002-04-16 | 2011-06-23 | Massachusetts Inst Of Technology <Mit> | Authentication of integrated circuit |
US7904731B2 (en) | 2002-04-16 | 2011-03-08 | Massachusetts Institute Of Technology | Integrated circuit that uses a dynamic characteristic of the circuit |
US7840803B2 (en) | 2002-04-16 | 2010-11-23 | Massachusetts Institute Of Technology | Authentication of integrated circuits |
US8386801B2 (en) | 2002-04-16 | 2013-02-26 | Massachusetts Institute Of Technology | Authentication of integrated circuits |
US7818569B2 (en) | 2002-04-16 | 2010-10-19 | Massachusetts Institute Of Technology | Data protection and cryptographic functions using a device-specific value |
WO2003090259A3 (en) * | 2002-04-16 | 2004-07-08 | Massachusetts Inst Technology | Authentication of integrated circuits |
US7681103B2 (en) | 2002-04-16 | 2010-03-16 | Massachusetts Institute Of Technology | Reliable generation of a device-specific value |
US7757083B2 (en) | 2002-04-16 | 2010-07-13 | Massachusetts Institute Of Technology | Integrated circuit that uses a dynamic characteristic of the circuit |
EP1533845A4 (en) * | 2002-05-31 | 2010-07-07 | Pioneer Corp | Semiconductor memory element and its lifetime operation starting device |
EP1533845A1 (en) * | 2002-05-31 | 2005-05-25 | Pioneer Corporation | Semiconductor memory element and its lifetime operation starting device |
US7498644B2 (en) | 2002-06-04 | 2009-03-03 | Nds Limited | Prevention of tampering in electronic devices |
JP2011243231A (en) * | 2002-10-09 | 2011-12-01 | Intel Corp | Capsulation of highly reliable platform module function by tcpa within server management co-processor subsystem |
WO2004036649A1 (en) * | 2002-10-11 | 2004-04-29 | Infineon Technologies Ag | Attack protected chip |
FR2859805A1 (en) * | 2003-09-12 | 2005-03-18 | Arjo Wiggins Secutity Sas | Security document such as banknote or passport has fibrous layer incorporating electronic chip that is altered by attempted access to data |
WO2005027033A3 (en) * | 2003-09-12 | 2005-05-26 | Arjowiggins Security | Secure paper comprising a fibrous layer and an electronic chip |
US8110008B2 (en) | 2003-09-12 | 2012-02-07 | Arjowiggins Security | Secure paper comprising a fiber layer and an electronic chip |
US7732321B2 (en) | 2004-05-17 | 2010-06-08 | Nds Limited | Method for shielding integrated circuits |
US8074082B2 (en) * | 2004-10-08 | 2011-12-06 | Aprolase Development Co., Llc | Anti-tamper module |
US8756438B2 (en) | 2004-11-12 | 2014-06-17 | Verayo, Inc. | Securely field configurable device |
US7839278B2 (en) | 2004-11-12 | 2010-11-23 | Verayo, Inc. | Volatile device keys and applications thereof |
US7564345B2 (en) | 2004-11-12 | 2009-07-21 | Verayo, Inc. | Volatile device keys and applications thereof |
US7702927B2 (en) | 2004-11-12 | 2010-04-20 | Verayo, Inc. | Securely field configurable device |
EP2615641A2 (en) | 2006-01-24 | 2013-07-17 | Nds Limited | Chip attack protection |
US8630410B2 (en) | 2006-01-24 | 2014-01-14 | Verayo, Inc. | Signal generator based device security |
US7966666B2 (en) | 2006-01-24 | 2011-06-21 | Nds Limited | Chip attack protection |
EP2082517A4 (en) * | 2006-10-17 | 2011-09-28 | Semtek Innovative Solutions Inc | Encrypted token transactions |
GB2452763A (en) * | 2007-09-12 | 2009-03-18 | Seiko Epson Corp | Smart-card chip with organic semiconductor surface layer for detecting invasive attack |
US8511567B2 (en) | 2007-09-12 | 2013-08-20 | Seiko Epson Corporation | Smart card chip arrangement |
US8782396B2 (en) | 2007-09-19 | 2014-07-15 | Verayo, Inc. | Authentication with physical unclonable functions |
US8657191B2 (en) | 2007-10-18 | 2014-02-25 | Nxp B.V. | Magnetic detection of back-side layer |
WO2010059266A1 (en) * | 2008-11-19 | 2010-05-27 | Sony Ericsson Mobile Communications Ab | System and method for protecting circuit boards |
EP3682471A4 (en) * | 2017-09-15 | 2021-04-28 | Cryptography Research, Inc. | Packaging techniques for backside mesh connectivity |
US11502047B2 (en) | 2017-09-15 | 2022-11-15 | Cryptography Research Inc. | Packaging techniques for backside mesh connectivity |
CN111095534A (en) * | 2017-09-15 | 2020-05-01 | 密码研究公司 | Packaging technology for back grid connection |
WO2019055307A1 (en) | 2017-09-15 | 2019-03-21 | Cryptography Research, Inc. | Packaging techniques for backside mesh connectivity |
US11422111B2 (en) | 2017-12-07 | 2022-08-23 | Bae Systems Plc | Integrity monitor |
EP3721173B1 (en) * | 2017-12-07 | 2024-02-28 | BAE Systems PLC | Integrity monitor |
US12067156B2 (en) | 2018-09-18 | 2024-08-20 | Blueskytec Ltd. | Electronic anti-tamper device |
WO2020058686A1 (en) * | 2018-09-19 | 2020-03-26 | Blueskytec Ltd | Electronic anti-tamper device |
GB2577280B (en) * | 2018-09-19 | 2022-11-09 | Blueskytec Ltd | Electronic anti-tamper device |
US20220271931A1 (en) * | 2019-07-04 | 2022-08-25 | Basf Se | New method for pseudo-random number generation for information encryption |
EP4036767A1 (en) * | 2021-01-28 | 2022-08-03 | Continental Automotive Technologies GmbH | Arrangement comprising a multi-layer printed circuit board and method for operating a multi-layer printed circuit board |
EP4206965A1 (en) * | 2021-12-30 | 2023-07-05 | Moxa Inc. | Computer system for failing a secure boot in a case tampering event |
Also Published As
Publication number | Publication date |
---|---|
KR100687071B1 (en) | 2007-02-27 |
CA2395656A1 (en) | 2001-07-12 |
US20010033012A1 (en) | 2001-10-25 |
US7005733B2 (en) | 2006-02-28 |
EP1243027A1 (en) | 2002-09-25 |
KR20020086882A (en) | 2002-11-20 |
JP2003519852A (en) | 2003-06-24 |
AU783858B2 (en) | 2005-12-15 |
CN1433576A (en) | 2003-07-30 |
AU2389501A (en) | 2001-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU783858B2 (en) | Anti tamper encapsulation for an integrated circuit | |
US20200349295A1 (en) | Tamper detection countermeasures to deter physical attack on a security asic | |
US4593384A (en) | Security device for the secure storage of sensitive data | |
US5708715A (en) | Integrated circuit device with function usage control | |
KR100341665B1 (en) | Confidential data processor with password and change detection | |
CN100390700C (en) | Tamper-resistant packaging and approach using magnetically-set data | |
CA1288492C (en) | Method of controlling the operation of security modules | |
US20070018334A1 (en) | Security method for data protection | |
JP4093610B2 (en) | Security device for semiconductor chip | |
WO1997004378A1 (en) | Microcircuit with memory that is protected by both hardware and software | |
JPH03105538A (en) | Defence barrier for infiltration into electronic assembly | |
US20120185636A1 (en) | Tamper-Resistant Memory Device With Variable Data Transmission Rate | |
JPH0787237B2 (en) | Integrated circuit chip | |
CN101512660A (en) | Detecting radiation-based attacks | |
JP2007535736A (en) | Device with integrated circuit | |
US6836847B1 (en) | Software protection for single and multiple microprocessor systems | |
WO2007018761A2 (en) | Security method for data protection | |
US20060050876A1 (en) | Integrated circuit with coded security signal, security process, corresponding security device and signal coded using a dynamic key | |
US20030133241A1 (en) | Method and arrangement for protecting digital parts of circuits | |
JP2000076140A (en) | Semiconductor integrated circuit | |
US12015723B2 (en) | Physically unclonable function device | |
EP4439365A1 (en) | A cryptographic device | |
Zamiri Azar et al. | Multilayer Approach to Logic Locking | |
Dubrova | Hardware Security | |
Auer | Tamper Resistant Smart Cards-Attacks and Counter Measures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2395656 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020027008558 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 550810 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000987594 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 23895/01 Country of ref document: AU Ref document number: 008187150 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2000987594 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020027008558 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWG | Wipo information: grant in national office |
Ref document number: 23895/01 Country of ref document: AU |