PHYSICS-BASED KEY GENERATION
First Claim
1. A method comprising:
- receiving an output generated by a first component of a first node, wherein the output is based on a physical configuration of the first component, and wherein outputs generated by the first component vary over time;
generating, with a controller of the first node, a key based on the output;
encrypting, with the controller, data with the key; and
transmitting the encrypted data to a second node, the second node comprising a second component configured to generate an output that is based on a physical configuration of the second component, wherein a first clock of the first node and a second clock of the second node are substantially synchronized such that the first and second nodes are configured to generate substantially time-matched keys based on outputs of the first and second components, respectively.
0 Assignments
0 Petitions
Accused Products
Abstract
In some examples, a controller is configured to generate a key based on a physics-based output of a component. The controller may, for example, use the key to authenticate communication between at least two nodes, to encrypt data, or to decrypt data, may be generated based on a physics-based output generated a component. The output generated by the component may vary over time, such that the controller is configured to generate a different key, depending on the time at which the output from the component used to generate the key was generated by the component. In some examples, the key is not stored in a memory, and is a discrete signal that only exists in real-time while the component is active and generating the detectable output.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving an output generated by a first component of a first node, wherein the output is based on a physical configuration of the first component, and wherein outputs generated by the first component vary over time; generating, with a controller of the first node, a key based on the output; encrypting, with the controller, data with the key; and transmitting the encrypted data to a second node, the second node comprising a second component configured to generate an output that is based on a physical configuration of the second component, wherein a first clock of the first node and a second clock of the second node are substantially synchronized such that the first and second nodes are configured to generate substantially time-matched keys based on outputs of the first and second components, respectively. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a first node comprising; a communication module; a first component configured to generate an output, wherein the first component is a physical structure, wherein the output is based on a physical configuration of the first component, and wherein outputs generated by the first component vary over time; a first clock; and a controller configured to generate a key based on the output generated by the first component, encrypt data with the key, and transmit the encrypted data to a second node via the communication module, the second node comprising a second component configured to generate an output that is based on a physical configuration of the second component, wherein a first clock of the first node and a second clock of the second node are synchronized such that the first and second nodes are configured to generate substantially time-matched keys based on outputs of the first and second components, respectively. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a first node comprising; a communication module; a first component configured to generate an output, wherein the first component is a physical structure, wherein the output is based on a physical configuration of the first component, and wherein outputs generated by the first component vary over time; a first clock; and a controller configured to generate a key based on the output generated by the first component, receive data from a second node, and decrypt the received data with the key, the second node comprising a second component configured to generate an output that is based on a physical configuration of the second component, wherein a first clock of the first node and a second clock of the second node are synchronized such that the first and second nodes are configured to generate substantially time-matched keys based on outputs of the first and second components, respectively. - View Dependent Claims (17, 18, 19, 20)
-
Specification