Volatile Device Keys And Applications Thereof
First Claim
Patent Images
1. A method comprising:
- receiving identification information from a device;
sending a first challenge to a device, the first challenge selected from a database associated with the received identification information, the database including a plurality of first challenges and a plurality of stored responses, each stored response associated with a first challenge;
receiving a volatile response from the device, the volatile response determined in the device according to a sequence of challenge values generated in the device on the basis of the first challenge; and
authenticating the device by comparing the received volatile response with the stored response associated with the sent first challenge.
2 Assignments
0 Petitions
Accused Products
Abstract
A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
92 Citations
27 Claims
-
1. A method comprising:
-
receiving identification information from a device; sending a first challenge to a device, the first challenge selected from a database associated with the received identification information, the database including a plurality of first challenges and a plurality of stored responses, each stored response associated with a first challenge; receiving a volatile response from the device, the volatile response determined in the device according to a sequence of challenge values generated in the device on the basis of the first challenge; and authenticating the device by comparing the received volatile response with the stored response associated with the sent first challenge. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An integrated circuit comprising:
-
a communication module configured to communication with an authentication device; and circuitry configured to generate a volatile response, the volatile response determined according to a sequence of challenge values generated in the integrated circuit on the basis of a first challenge received from the authentication device; wherein the volatile response is sent by the communication module to the authentication device for authentication of the integrated circuit. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for authenticating a device on the basis of identification information received from the device, comprising:
-
a database storing a plurality of first challenges and a plurality of stored responses, each stored response associated with a first challenge; a selection module configured to select from the database a first challenge associated with the received identification information; a communication module configured to send the selected first challenge to the device, and receive a volatile response from the device, the volatile response determined in the device according to a sequence of challenge values generated in the device on the basis of the first challenge; and an authentication module configured to compare the received volatile response with the stored response associated with the selected first challenge. - View Dependent Claims (24, 25, 26, 27)
-
Specification