Extraction apparatus and method for chip finger print

A technology for extracting devices and fingerprints, which is applied in the field of information processing, can solve problems such as circuits being vulnerable to attacks, and achieve the effects of enhancing security, improving stability, and preventing modeling or copying

Active Publication Date: 2009-07-08
观源(上海)科技有限公司
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the extreme imbalance of 0 and 1 in the output response, the entire circuit is relatively vulnerable to attacks, and attackers can easily predict the output of the circuit through modeling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extraction apparatus and method for chip finger print
  • Extraction apparatus and method for chip finger print
  • Extraction apparatus and method for chip finger print

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0027] Such as figure 1 As shown, the chip fingerprint extraction device involved in this embodiment includes: a transmission delay path, an excitation signal controller and an arbitrator, wherein:

[0028] The transmission delay path is used to form two upper and lower fully symmetrical transmission paths, and the same pulse signal competes to pass through the upper and lower two completely symmetrical transmission paths;

[0029] The excitation signal controller is used to control the transmission path of the pulse signal on the transmission delay path, and the pul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a device for extracting chip fingerprint and a method thereof, which belong to the technical field of information processing. The device comprises transmission delay passage, an excitation signal controller and an arbiter. The transmission delay passage is formed by N switches in series arrangement, wherein N is an integral multiple of 2, and each of the switches comprises a pair of 2-1 multiplexers and a pair of buffers. The excitation signal controller comprises an N-bit linear shift feedback register. The arbiter comprises a D trigger. The N-bit output of the excitation signal controller is connected with the control terminals of the N switches. The arbiter is connected with the output terminal of the last switch. The same one pulse signal competitively passes through the two paths. The D trigger in the arbiter judges that the output is 0 or 1 according to the sequence in which the rising edge of pulse signal of the upper path and the lower path arrives. The device is excellent in the 0 / 1 balance of output response.

Description

technical field [0001] The present invention relates to a device and method in the technical field of information processing, in particular to a device and method for extracting chip fingerprints. Background technique [0002] The information security application field involves many factors; among them, the reliable protection of keys is the basic element in the information security application field. The purpose of reliable protection of the key is to prevent some people from malicious counterfeiting, fraud, etc.; that is, protecting the key so that it does not leak can effectively protect the security of the system. Usually, the key is protected by storing it in a non-volatile memory (such as EEPROM, Electrically Erasable Programmable Read Only Memory), or burning it directly on the silicon chip in the form of a fuse. Both of these methods make the key exist statically (even if it is not used, the key will not disappear), and even exist statically in plaintext. However, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00
Inventor 谷大武侯方勇张俊钦
Owner 观源(上海)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products