Multi-factor authentication
Abstract
Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.
- Inventors:
- Issue Date:
- Research Org.:
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1160234
- Patent Number(s):
- 8868923
- Application Number:
- 12/908,414
- Assignee:
- Sandia Corporation (Albuquerque, NM)
- Patent Classifications (CPCs):
-
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
H - ELECTRICITY H03 - BASIC ELECTRONIC CIRCUITRY H03K - PULSE TECHNIQUE
- DOE Contract Number:
- AC04-94AL85000
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 2010 Oct 20
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Hamlet, Jason R, and Pierson, Lyndon G. Multi-factor authentication. United States: N. p., 2014.
Web.
Hamlet, Jason R, & Pierson, Lyndon G. Multi-factor authentication. United States.
Hamlet, Jason R, and Pierson, Lyndon G. Tue .
"Multi-factor authentication". United States. https://www.osti.gov/servlets/purl/1160234.
@article{osti_1160234,
title = {Multi-factor authentication},
author = {Hamlet, Jason R and Pierson, Lyndon G},
abstractNote = {Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2014},
month = {10}
}
Works referenced in this record:
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
journal, October 2008
- Guajardo, Jorge; Škorić, Boris; Tuyls, Pim
- Information Systems Frontiers, Vol. 11, Issue 1
Remote patient monitoring: Information reliability challenges
conference, October 2009
- Petkovic, Milan
- TELSIKS 2009 - 2009 9th International Conference on Telecommunications in Modern Satellite, Cable, and Broadcasting Services, 2009 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services
Physical Unclonable Functions and Their Applications to Vehicle System Security
conference, April 2009
- Asim, Muhammad; Guajardo, Jorge; Kumar, Sandeep S.
- 2009 IEEE 69th Vehicular Technology Conference Spring, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference
Hardware intrinsic security from D flip-flops
conference, January 2010
- van der Leest, Vincent; Schrijen, Geert-Jan; Handschuh, Helena
- Proceedings of the fifth ACM workshop on Scalable trusted computing - STC '10
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method
conference, December 2006
- Ignatenko, Tanya; Schrijen, Geert-jan; Skoric, Boris
- 2006 IEEE International Symposium on Information Theory
Combining Crypto with Biometrics Effectively
journal, September 2006
- Feng Hao, ; Anderson, R.; Daugman, J.
- IEEE Transactions on Computers, Vol. 55, Issue 9
A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations
journal, January 2008
- Su, Ying; Holleman, Jeremy; Otis, Brian P.
- IEEE Journal of Solid-State Circuits, Vol. 43, Issue 1
A technique to build a secret key in integrated circuits for identification and authentication applications
conference, January 2004
- Lee, J. W.; Gassend, B.
- 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525)
Energy Scalable Universal Hashing
journal, December 2005
- Kaps, J.; Yuksel, K.; Sunar, B.
- IEEE Transactions on Computers, Vol. 54, Issue 12
Extended abstract: The butterfly PUF protecting IP on every FPGA
conference, June 2008
- Kumar, Sandeep S.; Guajardo, Jorge; Maes, Roel
- 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
journal, January 2008
- Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid
- SIAM Journal on Computing, Vol. 38, Issue 1
LFSR-based Hashing and Authentication
conference, January 1994
- Krawczyk, Hugo; Desmedt, Yvo G.
- Advances in Cryptology — CRYPTO ’94, p. 129-139
Physical unclonable functions for device authentication and secret key generation
conference, January 2007
- Suh, G. Edward; Devadas, Srinivas
- Proceedings of the 44th annual conference on Design automation - DAC '07
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
conference, August 2007
- Guajardo, Jorge; Kumar, Sandeep S.; Schrijen, Geert-Jan
- 2007 International Conference on Field Programmable Logic and Applications
Protecting bus-based hardware IP by secret sharing
conference, January 2008
- Roy, Jarrod A.; Koushanfar, Farinaz; Markov, Igor L.
- Proceedings of the 45th annual conference on Design automation - DAC '08