Unclonable ID based chip-to-chip communication
First Claim
Patent Images
1. A computer implemented method for authenticating a node in an electronic communications system, the method comprising:
- receiving an authentication request from a node;
transmitting a generating challenge to the node, wherein the generating challenge prompts the node to generate a first code representing an output of a first encryption challenge having inputs that include a random value and a first intrinsic ID based on an intrinsic feature, wherein the first encryption challenge is an invertible function;
receiving the first code from the node in response to the generating challenge;
generating a second code as an extracted value from an inverse function, wherein the second code represents an output of a second encryption challenge having inputs that include at least two of;
the first code, the random value, and a second intrinsic ID, wherein the second intrinsic ID is obtained from a source other than the node, and wherein the random value comprises one of an external value transmitted to the node and the electronic communications system, or a value generated in each of the electronic communications system and the node using a same seed input; and
authenticating the node, using a check function, based on one or more of;
the second encryption challenge having inputs of the random value and the second intrinsic ID, and the second code matching the first code;
the second encryption challenge having inputs of the first code and the random value, and the second code matching the second intrinsic ID; and
the second encryption challenge having inputs of the first code and the second intrinsic ID, and the second code matching the random value;
whereby the first intrinsic ID matches the second intrinsic ID.
9 Assignments
0 Petitions
Accused Products
Abstract
A first copy of an intrinsic ID of a first node may be stored on a second node. The first node may receive a challenge that causes it to generate a second copy of its intrinsic ID. The second copy and a random value may be used as inputs of a function to generate a first code. The first code is transmitted to the second node. The second node decodes the first code using its local copies of the random value and/or the intrinsic ID. The second node checks the decoded information against its local information and authenticates the first node if there is a match.
17 Citations
18 Claims
-
1. A computer implemented method for authenticating a node in an electronic communications system, the method comprising:
-
receiving an authentication request from a node; transmitting a generating challenge to the node, wherein the generating challenge prompts the node to generate a first code representing an output of a first encryption challenge having inputs that include a random value and a first intrinsic ID based on an intrinsic feature, wherein the first encryption challenge is an invertible function; receiving the first code from the node in response to the generating challenge; generating a second code as an extracted value from an inverse function, wherein the second code represents an output of a second encryption challenge having inputs that include at least two of; the first code, the random value, and a second intrinsic ID, wherein the second intrinsic ID is obtained from a source other than the node, and wherein the random value comprises one of an external value transmitted to the node and the electronic communications system, or a value generated in each of the electronic communications system and the node using a same seed input; and authenticating the node, using a check function, based on one or more of; the second encryption challenge having inputs of the random value and the second intrinsic ID, and the second code matching the first code; the second encryption challenge having inputs of the first code and the random value, and the second code matching the second intrinsic ID; and the second encryption challenge having inputs of the first code and the second intrinsic ID, and the second code matching the random value; whereby the first intrinsic ID matches the second intrinsic ID. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for authenticating a node in an electronic communications system, the system comprising:
-
a computer having a processor and a tangible storage device; and a program embodied on the storage device for execution by the processor, the program having a plurality of modules, the plurality of modules including; a receiving module configured to receive an authentication request from a node; a transmitting module configured to transmit a generating challenge to the node, wherein the generating challenge prompts the node to generate a first code representing an output of a first encryption challenge having inputs that include a random value and a first intrinsic ID based on an intrinsic feature, wherein the first encryption challenge is an invertible function; a second receiving module configured to receive the first code from the node in response to the generating challenge; a generating module configured to generate a second code as an extracted value from an inverse function, wherein the second code represents an output of a second encryption challenge having inputs that include at least two of; the first code, the random value, and a second intrinsic ID, wherein the second intrinsic ID is obtained from a source other than the node, and wherein the random value comprises one of an external value transmitted to the node and the electronic communications system, or a value generated in each of the electronic communications system and the node using a same seed input; and an authenticating module configured to authenticate the node, using a check function, based on one or more of; the second encryption challenge having inputs of the random value and the second intrinsic ID, and the second code matching the first code; the second encryption challenge having inputs of the first code and the random value, and the second code matching the second intrinsic ID; and the second encryption challenge having inputs of the first code and the second intrinsic ID, and the second code matching the random value; whereby the first intrinsic ID matches the second intrinsic ID. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for authenticating a node in an electronic communications system, the computer program product comprising a tangible storage non-transitory computer-readable device having program code embodied therewith, the program code executable by a processor of a computer to perform a method, the method comprising:
-
receiving, by the processor, an authentication request from a node; transmitting a generating challenge to the node, wherein the generating challenge prompts the node to generate a first code representing an output of a first encryption challenge having inputs that include a random value and a first intrinsic ID based on an intrinsic feature, wherein the first encryption challenge is an invertible function; receiving, by the processor, the first code from the node in response to the generating challenge; generating, by the processor, a second code as an extracted value from an inverse function, wherein the second code represents an output of a second encryption challenge having inputs that include at least two of;
the first code, the random value, and a second intrinsic ID, wherein the second intrinsic ID is obtained from a source other than the node, andwherein the random value comprises one of an external value transmitted to the node and the electronic communications system, or a value generated in each of the electronic communications system and the node using a same seed input; and authenticating, by the processor, the node using a check function based on one or more of; the second encryption challenge having inputs of the random value and the second intrinsic ID, and the second code matching the first code; the second encryption challenge having inputs of the first code and the random value, and the second code matching the second intrinsic ID; and the second encryption challenge having inputs of the first code and the second intrinsic ID, and the second code matching the random value; whereby the first intrinsic ID matches the second intrinsic ID. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification