Anti-theft system and method for semiconductor devices and other electronic components
First Claim
1. A semiconductor device, including:
- a stored device identifier that identifies said device, wherein said device identifier is accessible to one or more particular external systems;
a stored secret key, wherein said secret key is inaccessible to said one or more particular external systems;
an input configured to receive a system identifier and an authorization key from said one or more particular external systems, wherein said system identifier is an identifier of said one or more particular external systems; and
an authorization unit configured to enable or disable said device in accordance with the stored secret key, the system identifier and the authorization key, wherein the authorization unit is configured to enable said device in response to determining that the authorization key is based on both the stored secret key and the system identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
A semiconductor device includes a stored device identifier that is accessible to external systems, and a stored secret key that is inaccessible to external systems. The device also includes an input, which in operation receives a system identifier, representing the system into which the device is to be incorporated, and an authorization key. An authorization unit within the device is then used for enabling or disabling the device in accordance with the values of the stored secret key, the received system identifier and the authorization key. The authorization key is typically supplied by a support center in response to being notified of the device identifier. In one embodiment, the authorization unit encrypts the system identifier using the stored secret key as the encryption key and then compares the result against the authorization key.
23 Citations
63 Claims
-
1. A semiconductor device, including:
-
a stored device identifier that identifies said device, wherein said device identifier is accessible to one or more particular external systems; a stored secret key, wherein said secret key is inaccessible to said one or more particular external systems; an input configured to receive a system identifier and an authorization key from said one or more particular external systems, wherein said system identifier is an identifier of said one or more particular external systems; and an authorization unit configured to enable or disable said device in accordance with the stored secret key, the system identifier and the authorization key, wherein the authorization unit is configured to enable said device in response to determining that the authorization key is based on both the stored secret key and the system identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An electronic subsystem for installation into a larger system, said subsystem including:
-
a stored device identifier that identifies the subsystem, wherein said device identifier is accessible to said larger system; a stored secret key, wherein said secret key is inaccessible to said larger system; an input configured to receive a system identifier and an authorization key from said larger system, wherein said system identifier is an identifier of said larger system; and an authorization unit configured to enable or disable said subsystem in accordance with the stored secret key, the system identifier and the authorization key;
wherein the authorization unit is configured to enable said device in response to determining that the authorization key is based on both the stored secret key and the system identifier.
-
-
26. An electronic system, comprising:
-
a stored system identifier that identifies the electronic system; and at least one component comprising a stored device identifier that identifies the at least one component and is accessible to one or more other components of said electronic system, the at least one component further comprising a stored secret key inaccessible to said one or more other components of said electronic system; wherein the at least one component comprises a communications path configured to receive the system identifier and an authorization key from the electronic system; wherein said at least one component is configured to be activated in response to determining that the authorization key is dependent on both the received system identifier and said stored secret key. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A method of manufacturing a semiconductor device, comprising:
-
storing a device identifier and a secret key on the device, wherein said device identifier identifies said device, wherein said device identifier is accessible to one or more particular external systems, and wherein said secret key is inaccessible to said one or more particular external systems; and incorporating into the device an authorization unit for enabling or disabling the device in accordance with the stored secret key and a system identifier and an authorization key both received from said one or more particular external systems, wherein said system identifier is an identifier of said one or more particular external systems, wherein the authorization unit is configured to enable said device in response to determining that the authorization key is based on both the stored secret key and the system identifier. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38)
-
-
39. A method of manufacturing an electronic system, comprising:
-
storing a system identifier in the system; installing at least one component including a stored device identifier and a stored secret key into the system, wherein said at least one component is configured to be enabled or disabled for use in accordance with the system identifier, a received authorization key, and the stored secret key, wherein the at least one component is configured to be enabled in response to determining that the authorization key is based on both the stored secret key and the system identifier; and creating in the electronic system for each at least one component installed into the system, a record of a matched pair including an authorization key to be used with that component in conjunction with the stored system identifier, wherein the authorization key is mapped in the record to the device identifier for the corresponding component.
-
-
40. A method of operating an electronic system comprising:
-
accessing a system identifier for the electronic system; ascertaining a device identifier associated with a component of the electronic system, said component including a secret key; providing an authorization key and the system identifier to said component, wherein a correct authorization key is dependent upon said system identifier and said secret key; determining within the component whether or not the provided authorization key is the correct authorization key, based on the system identifier and the secret key for the component; disabling or enabling said component according to whether or not the authorization key is the correct authorization key. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A method of operating a support center comprising the steps of:
-
maintaining a database of components, wherein for each component there is a stored device identifier and secret key; receiving a request to allow a component having a particular device identifier to be used in a system having a particular system identifier; retrieving the secret key for the component based on the particular device identifier within said request; determining an authorization key for the component, based on the received system identifier and retrieved secret key; and providing a response to said request, wherein the response includes the determined authorization key. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59)
-
-
60. A semiconductor device, including:
-
means for storing a device identifier that identifies said device, wherein said device identifier is accessible to one or more particular external systems; means for storing a secret key, wherein said secret key is inaccessible to said one or more particular external systems; means for receiving a system identifier and an authorization key from said one or more particular external systems, wherein said system identifier is an identifier of said one or more particular external systems; and means for enabling or disabling said device in accordance with the stored secret key, the system identifier and the authorization key, wherein said means for enabling or disabling includes means for enabling said device in response to determining that the authorization key is based on both the stored secret key and the system identifier.
-
-
61. An electronic system, comprising:
-
means for storing a system identifier identifying said system; at least one component including means for storing a device identifier such that the device identifier is accessible to one or more other components of said electronic systems and a stored secret key such that the stored secret key is inaccessible to said one or more other components of said electronic system, wherein the device identifier identifies said at least one component; means for supplying said at least one component with the stored system identifier and with an authorization key that is dependent on said system identifier and said stored secret key; and means for enabling said at least one component in response to determining that the authorization key is dependent on said system identifier and said stored secret key.
-
-
62. A program product, comprising machine instructions on a medium for loading into an electronic system, wherein said instructions cause the system to perform the steps of:
-
accessing a system identifier for the electronic system; ascertaining a device identifier associated with a particular component of the electronic system, said particular component including a stored secret key that is inaccessible to all other components of the electronic system; and providing an authorization key and the system identifier to said particular component; generating, via the particular component, a correct authorization key that is dependent upon said system identifier and said secret key; and determining, via the particular component, whether or not the authorization key matches said correct authorization key and enabling or disabling the particular component in accordance with that determination.
-
-
63. A program product, comprising machine instructions on a medium for loading into a computer, wherein said instructions cause the computer to perform the steps of:
-
receiving a request to allow a component having a particular device identifier to be used in a system having a particular system identifier; accessing a database of components, wherein for each component there is a stored device identifier and secret key; retrieving from the database a secret key for the component based on the particular device identifier; determining an authorization key for the component, based on the received system identifier and retrieved secret key; and providing a response to said request, wherein the response includes the determined authorization key.
-
Specification