Authentication method and equipment based on PUF (Physically Unclonable Function)

An authentication method and equipment technology, applied in the field of information security, can solve the problem of low authentication security, and achieve the effect of improving security and preventing forgery

Inactive Publication Date: 2016-02-10
DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] To sum up, the above-mentioned PUF-based offline authentication method, because the unique private key based on PUF is likely to be stolen during the process of generating the public key and certificate, is used for authentication of other counterfeit devices, so the authentication security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and equipment based on PUF (Physically Unclonable Function)
  • Authentication method and equipment based on PUF (Physically Unclonable Function)
  • Authentication method and equipment based on PUF (Physically Unclonable Function)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0059] It can be seen from the background technology that during the life cycle of the PUF-based offline authentication device, no one can guarantee that the unique private key of the PUF in the device will not be stolen. The problem that the unique private key based on PUF may be stolen may occur, so that the device will be forged based on the unique private key of PUF, so that the forged device is still legal in the verification stage, resulting in a reduction in the security of the authentication method.

[0060] In order to solve this problem, when the embodiment of the present invention performs the PUF-based offline authentication method, when generating the private key, it is not only based on the difference value of the internal physical structure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and equipment based on a PUF (Physically Unclonable Function). When an offline authentication method based on the PUF is carried out, a private key is generated through combining an inherent physical structure difference value based on the PUF and a chip operating system code of the equipment, and the private key is also verified through combining the inherent physical structure difference value based on the PUF and the chip operating system code of the equipment. The authenticated private key is bound with the chip operating system code of the equipment and the inherent physical structure difference value based on the PUF, any behavior which attempts to obtain the private key through modifying the chip operating system code cannot obtain the authenticated private key, so that the false equipment is prevented, and thus the safety of the equipment having the offline authentication based on the PUF is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authentication method and equipment based on a physical unclonable functional unit (PUF). Background technique [0002] With the development of semiconductor technology, PUF appeared. PUF is a set of miniature circuits. By extracting the physical structure differences that inevitably occur during the manufacturing process of semiconductor devices, an infinite number of unique "keys" are generated. These "keys" are unpredictable. When the PUF is powered on, The key exists, and when the power is off, the key disappears, and even the manufacturer of the chip cannot imitate it, so these "keys" can be widely used in security and anti-counterfeiting. [0003] Currently, there are many PUF-based authentication methods. Among them, the most commonly used authentication method is the online authentication method based on PUF, specifically: [0004] First, generate a unique respon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 刘宗斌章庆隆韩晔高能向继王琼霄
Owner DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products