APPARATUS AND METHOD FOR AUTHENTICATION BETWEEN DEVICES BASED ON PUF OVER MACHINE-TO-MACHINE COMMUNICATIONS
First Claim
1. A terminal device that performs machine-to-machine (M2M) communication, the terminal device comprising:
- a physical unclonable function (PUF) embedded in the terminal device to generate an authentication key for password authentication associated with the terminal device; and
an authentication unit to perform the password authentication associated with the terminal device using the authentication key generated by the PUF.
1 Assignment
0 Petitions
Accused Products
Abstract
Terminal devices that perform machine-to-machine (M2M) communication may autonomously perform password authentication by autonomously generating a personal identity number (PIN) value, which is not exposed externally, using a physical unclonable function (PUF). A terminal apparatus that performs M2M communication may include a PUF embedded in the terminal apparatus to generate an authentication key for password authentication associated with the terminal apparatus, and an authentication unit to perform the password authentication associated with the terminal apparatus using the authentication key generated by the PUF.
44 Citations
19 Claims
-
1. A terminal device that performs machine-to-machine (M2M) communication, the terminal device comprising:
-
a physical unclonable function (PUF) embedded in the terminal device to generate an authentication key for password authentication associated with the terminal device; and an authentication unit to perform the password authentication associated with the terminal device using the authentication key generated by the PUF. - View Dependent Claims (2)
-
-
3. A terminal device that performs machine-to-machine (M2M) communication, the terminal device comprising:
-
a secret key module to provide a secret key for transferring, using a secret key encryption scheme, a public key used for communication of the terminal device using a public key encryption scheme; and a private key module to provide a private key for generating the public key, wherein at least one of the secret key module and the private key module includes a physical unclonable function (PUF). - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A certification authority (CA) device for managing a terminal device that performs machine-to-machine (M2M) communication, the CA device comprising:
-
a personal identity number (PIN) list to store a secret key of the terminal device and a serial number of the terminal device, wherein when a message, in which a public key used for communication using a public key encryption scheme and the serial number of the terminal device are encrypted using the secret key, is transmitted from the terminal device, the CA device decrypts the message using the secret key, and when the message is decrypted, the CA device verifies the validity of the external device depending on whether the identity of a serial number of the terminal device is acknowledged.
-
-
11. A method of performing, by a terminal device, security authentication in order to perform machine-to-machine (M2M) communication, the method comprising:
-
generating, by the terminal device, a private key of the terminal device using a first physical unclonable function (PUF) embedded in the terminal device; generating, by the terminal device, a public key for performing password authentication using the private key; and performing the password authentication with an external terminal other than the terminal device or an external certification authority (CA) using the public key. - View Dependent Claims (12, 13, 14, 19)
-
-
15. A method of relaying, by a certification authority (CA) device, public key exchange for machine-to-machine (M2M) communication between a first terminal device and a second terminal device, the method comprising:
-
receiving, from the second terminal device, a request for a public key of the first terminal device; generating a first encryption message by encrypting the public key of the first terminal device and a serial number of the second terminal device using a private key of the CA device; and transmitting the first encryption message to the second terminal device. - View Dependent Claims (16, 17, 18)
-
Specification