Volatile device keys and applications thereof
First Claim
Patent Images
1. A method comprising:
- receiving identification information from a device;
sending a first challenge to a device, the first challenge selected from a database associated with the received identification information, the database including data characterizing a plurality of first challenges and a plurality of corresponding responses, each response associated with a corresponding first challenge;
receiving a volatile response from the device, the volatile response determined in the device according to a sequence of challenge values generated in the device on the basis of the first challenge; and
authenticating the device using the received volatile response and the response corresponding to the sent first challenge.
2 Assignments
0 Petitions
Accused Products
Abstract
A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
84 Citations
51 Claims
-
1. A method comprising:
-
receiving identification information from a device; sending a first challenge to a device, the first challenge selected from a database associated with the received identification information, the database including data characterizing a plurality of first challenges and a plurality of corresponding responses, each response associated with a corresponding first challenge; receiving a volatile response from the device, the volatile response determined in the device according to a sequence of challenge values generated in the device on the basis of the first challenge; and authenticating the device using the received volatile response and the response corresponding to the sent first challenge. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An integrated circuit comprising:
-
a communication module configured to communication with an authentication device; and circuitry configured to generate a volatile response, the volatile response determined according to a sequence of challenge values generated in the integrated circuit on the basis of a first challenge received from the authentication device, wherein the circuitry is configured to accept each challenge in the sequence of challenges and, for each challenge, to generate a corresponding partial response, the volatile response being formed from the plurality of partial responses; wherein the communication module is configured to send the volatile response to the authentication device for authentication of the integrated circuit. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for authenticating a device on the basis of identification information received from the device, comprising:
-
a database storing data characterizing a plurality of first challenges and a plurality of corresponding responses, each response associated with a corresponding first challenge; a selection module configured to select from the database a first challenge associated with the received identification information; a communication module configured to send the selected first challenge to the device, and receive a volatile response from the device, the volatile response determined in the device according to a sequence of challenge values generated in the device on the basis of the first challenge; and an authentication module configured to use the received volatile response and the response corresponding to the selected first challenge. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A method comprising:
-
determining first challenge at a device, the first challenge selected from a database associated with the device, the database including a plurality of first challenges and corresponding codes, each first challenge corresponding to a code; determining a volatile response in the device according to a sequence of challenge values generated in the device on the basis of the determined first challenge; forming a cryptographic key in the device from the determined volatile response and the code corresponding to the first challenge; and performing a cryptographic function in the device using the formed cryptographic key. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A method comprising:
-
determining first challenge at a device; determining a volatile response in the device according to a sequence of challenge values generated in the device on the basis of the determined first challenge; determining a cryptographic key in the device, and forming a code from the cryptographic key, wherein at least one of determining the cryptographic key and forming the code from the cryptographic key is based on the determined volatile response; and repeating determining the volatile response in the device according to a sequence of challenge values generated in the device on the basis of the determined first challenge, and determining the cryptographic key in the device from the repeated determined volatile response and the code. - View Dependent Claims (43, 44, 45, 46, 47)
-
-
48. An integrated circuit comprising:
-
a database configured to store a plurality of first challenges and corresponding codes, each first challenge corresponding to a code; circuitry configured to generate a volatile response, the volatile response determined according to a sequence of challenge values generated in the integrated circuit on the basis of a first challenge received from the database; a cryptographic key generator configured to accepted the volatile response and a code corresponding to the first challenge; and a cryptographic module configurable according to a cryptographic key generated in the key generator.
-
-
49. A method comprising:
-
determining first challenge at a device; determining a volatile response in the device according to a sequence of challenge values generated in the device on the basis of the determined first challenge; determining a cryptographic key in the device, including determining a private key of a public key and private key pair; and forming a code from the cryptographic key; wherein at least one of determining the cryptographic key and forming the code from the cryptographic key is based on the determined volatile response. - View Dependent Claims (50, 51)
-
Specification