Secure authentication
First Claim
1. An authentication token device, comprising:
- a hardware public physically unclonable function that includes operational characteristics characterized by publicly available parameters, wherein the parameters are affected by unintentional manufacturing variability of the hardware public physically unclonable function;
an input register configured to load signals into the hardware public physically unclonable function at an input time, wherein the signals are propagated through the hardware public physically unclonable function so as to transform the signals in accordance with the unintentional manufacturing variability of the hardware public physically unclonable function; and
an output register configured to sample the transformed signals from the hardware public physically unclonable function at a specified time after the input time, wherein the transformed signals during the specified time differ from other transformed signals sampled at another time due to the unintentional manufacturing variability.
6 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for secure authentication tokens that employ hardware public physically unclonable functions. Each unique token can be implemented as hardware such that manufacturing variations provide measurable performance differences resulting in unique, unclonable devices or systems. For example, slight timing variations through a large number of logic gates may be used as a hardware public physically unclonable function of the authentication token. The authentication token can be characterized such that its physical characteristics may be publicly distributed to authenticators. Authenticators may then simulate the result from a particular input vector and then request the authentication token to generate the same result in a very short amount of time. The time may be specified such that the result could not be simulated by an imposter for a timely response.
109 Citations
20 Claims
-
1. An authentication token device, comprising:
-
a hardware public physically unclonable function that includes operational characteristics characterized by publicly available parameters, wherein the parameters are affected by unintentional manufacturing variability of the hardware public physically unclonable function; an input register configured to load signals into the hardware public physically unclonable function at an input time, wherein the signals are propagated through the hardware public physically unclonable function so as to transform the signals in accordance with the unintentional manufacturing variability of the hardware public physically unclonable function; and an output register configured to sample the transformed signals from the hardware public physically unclonable function at a specified time after the input time, wherein the transformed signals during the specified time differ from other transformed signals sampled at another time due to the unintentional manufacturing variability. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to generate an authentication challenge response using a hardware public physically unclonable function, the method comprising:
-
receiving initial values associated with the authentication challenge into an input register at an input time associated with the hardware public physically unclonable function, wherein the hardware public physically unclonable function is characterized by publicly available parameters that are affected by unintentional manufacturing variability of the hardware public physically unclonable function; coupling logic signals corresponding to the initial values from the input register into the hardware public physically unclonable function; propagating the logic signals through the hardware public physically unclonable function so as to transform the logic signals in accordance with unintentional manufacturing variability of the hardware public physically unclonable function; and receiving a signal to latch the transformed logic signals from the hardware public physically unclonable function into an output register at a specified time after the input time, wherein the transformed logic signals latched during the specified time differ from other transformed logic signals latched at another time due to the unintentional manufacturing variability. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer storage medium that includes computer-executable instructions stored thereon which, when executed by a computer system, cause the computer system to:
-
receive public information that characterizes unique parameters associated with a hardware public physically unclonable function; formulate an authentication challenge to be posed to the hardware public physically unclonable function; simulate the hardware public physically unclonable function based on the public information to generate an expected result to the authentication challenge, wherein the public information is associated with unintentional manufacturing variability of the hardware public physically unclonable function; offer the authentication challenge to an authentication device comprising the hardware public physically unclonable function, wherein the expected result is obtained from the hardware public physically unclonable function at a specified time after an input time when signals are loaded into the hardware public physically unclonable function; classify the authentication challenge as passed in response to receiving the expected result from the authentication device within a specified time period that is less than a time period required to simulate the hardware public physically unclonable function based on the public information to generate an expected result; and classify the authentication challenge as failed in response to not receiving the expected result from the authentication device within the specified time period. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification