DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

Abstract

Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Inventors:
; ;
Issue Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1159918
Patent Number(s):
8848905
Application Number:
12/844,860
Assignee:
Sandia Corporation (Albuquerque, NM)
Patent Classifications (CPCs):
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04K - SECRET COMMUNICATION
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
AC04-94AL85000
Resource Type:
Patent
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Hamlet, Jason R, Bauer, Todd M, and Pierson, Lyndon G. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting. United States: N. p., 2014. Web.
Hamlet, Jason R, Bauer, Todd M, & Pierson, Lyndon G. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting. United States.
Hamlet, Jason R, Bauer, Todd M, and Pierson, Lyndon G. Tue . "Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting". United States. https://www.osti.gov/servlets/purl/1159918.
@article{osti_1159918,
title = {Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting},
author = {Hamlet, Jason R and Bauer, Todd M and Pierson, Lyndon G},
abstractNote = {Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2014},
month = {9}
}

Works referenced in this record:

Error Detection Systems
patent, January 1974


Data processing systems and methods with enhanced bios functionality
patent, May 2008


Reliable generation of a device-specific value
patent, March 2010


Securely field configurable device
patent, April 2010


Lightweight secure physically unclonable functions
patent, March 2011


Usage metering based upon hardware aging
patent, September 2012


Generating PUF error correcting code using redundant hardware
patent, August 2013


Authentication of integrated circuits
patent-application, October 2003


Securely field configurable device
patent-application, September 2006


Volatile device keys and applications thereof
patent-application, September 2006


Integrated Circuit That Uses a Dynamic Characteristic of the Circuit
patent-application, October 2006


Data Protection and Cryptographic Functions Using a Device-Specific Value
patent-application, November 2006


Reliable Generation of a Device-Specific Value
patent-application, November 2006


Method for protecting information carrier comprising an integrated circuit
patent-application, February 2007


Method and system for authentication of a physical object
patent-application, February 2007


Controlling Access to Device-Specific Information
patent-application, August 2007


System and Method of Reliable Foward Secret Key Sharing with Physical Random Functions
patent-application, February 2008


Sharing a secret by using random function
patent-application, March 2008


Bidirectional receive side scaling
patent-application, March 2008


Core Spray Sparger T-Box Attachment and Clamp and Method for Clamping
patent-application, May 2008


Method, Apparatus, Device, System, Program, for Calibrating
patent-application, June 2008


Integrated Physical Unclonable Function (Puf) with Combined Sensor and Display
patent-application, September 2008


Integrated circuit for the authentication of a consumable storage device
patent-application, January 2009


Authentication with Physical Unclonable Functions
patent-application, March 2009


Memory Module with Reduced Access Granularity
patent-application, June 2009


Integrated Circuit That Uses A Dynamic Characteristic Of The Circuit
patent-application, September 2009


Volatile Device Keys And Applications Thereof
patent-application, October 2009


Information Security Apparatus
patent-application, February 2010


Semiconductor Device with Backside Tamper Protection
patent-application, April 2010


Integrated Circuit and Method for Preventing an Unauthorized Access to a Digital Value
patent-application, April 2010


Cognitive Error Control Coding for Channels with Memory
patent-application, May 2010


Non-Network RFID Authentication
patent-application, May 2010


Controlled Activation of Function
patent-application, June 2010


Device and Method for Providing Authentication
patent-application, July 2010


Identification of an Antenna
patent-application, November 2010


Secure Authentication
patent-application, November 2010


Defining Classification Thresholds in Template Protection Systems
patent-application, December 2010


Method and System for Electronically Securing an Electronic Biometric Device Using Physically Unclonable Functions
patent-application, January 2011


Lightweight Secure Physically Unclonable Functions
patent-application, March 2011


Testing Security of Mapping Functions
patent-application, March 2011


Information Processing Apparatus
patent-application, March 2011


Protecting Electronic Systems from Counterfeiting and Reverse Engineering
patent-application, June 2011


Identification of Devices using Physically Unclonable Functions
patent-application, September 2011


Differential Uncloneable Variability-Based Crytography
patent-application, September 2011


Physically Unclonable Function Implemented Through Threshold Voltage Comparison
patent-application, December 2011


Distribution System and Method for Distributing Digital Information
patent-application, August 2012


Device and Method for Obtaining a Cryptographic Key
patent-application, February 2013


Reconfigurable trusted computing in hardware
conference, January 2007


Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
book, January 2010


Dynamic Intellectual Property Protection for Reconfigurable Devices
conference, December 2007


Novel PUF-Based Error Detection Methods in Finite State Machines
book, January 2009


Protecting bus-based hardware IP by secret sharing
conference, January 2008


Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays
book, January 2007


Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
journal, October 2008


Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
journal, September 2009


A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations
journal, January 2008


A technique to build a secret key in integrated circuits for identification and authentication applications
conference, January 2004


Energy Scalable Universal Hashing
journal, December 2005


Extended abstract: The butterfly PUF protecting IP on every FPGA
conference, June 2008


FPGA Intrinsic PUFs and Their Use for IP Protection
conference, January 2007


Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
book, January 2004


LFSR-based Hashing and Authentication
conference, January 1994


Physical unclonable functions for device authentication and secret key generation
conference, January 2007


Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
conference, August 2007


    Works referencing / citing this record:

    System and device binding metadata with hardware intrinsic properties
    patent, June 2017


    Secure manufacturing of programmable devices
    patent, May 2017


    Physical unclonable function
    patent, May 2016


    Glitch resistant device
    patent, October 2015


    Area-efficient physically unclonable function circuit architecture
    patent, April 2015


    Secure operation of programmable devices
    patent, March 2015