Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Core copyright anonymous authentication method

An anonymous authentication and copyright technology, applied in digital data authentication, instruments, computing, etc., can solve PUF security threats and other issues

Active Publication Date: 2019-05-17
HUNAN UNIV
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the incentive response information is intercepted by illegal attackers, it may pose a threat to the security of PUFs (especially strong PUFs)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Core copyright anonymous authentication method
  • Core copyright anonymous authentication method
  • Core copyright anonymous authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The authentication scheme of the present invention adopts a double PUF authentication structure, that is, the FPGA manufacturer adopts the PUF model, and the original PUF is configured in the device. The legal manufacturer sets an access point for the original PUF, through which the manufacturer can collect a sufficient number of stimulus-response pairs, and by modeling and analyzing the collected stimulus-response pairs, the linearity of the PUF structure can be obtained. The delay vector can complete the modeling of the PUF. After the PUF model is established, in order to prevent attackers from using it, the access point will be destroyed and the access point will be permanently prohibited from being used again. Literature [13] pointed out that to build a PUF model with an accuracy rate of 90% and an error rate of 10%, only about a thousand stimulus-response pairs are needed (these PUFs are usually simple PUFs, and the stimulus-response information is fully exposed to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a core copyright anonymous authentication method, which adopts an application principle of a double-PUF structure to realize copyright authentication of a hardware FPGA and a software IP. Due to the use of the double-PUF structure, the FPGA provider does not need to pre-store all excitation response pairs of the PUF, the occupied system resources are few, and the safety andthe applicability are higher. Before the IP circuit performs transaction, the IP provider embeds copyright information and the anonymous identity of the purchaser into the IP core to realize passiveIP copyright protection and piracy tracking. The anonymity ensures the rights and interests of the purchaser, and the tracking and tracing of piracy behaviors can be realized under the participation of the trusted equipment provider.

Description

technical field [0001] The invention relates to the field of core core copyright authentication, in particular to an anonymous core core copyright authentication method. Background technique [0002] Since the concept of PUF was first proposed by Pappu et al. [1], researchers at home and abroad have made many instructive explorations around PUF-based copyright protection methods. The present invention implements the core core copyright anonymous authentication scheme based on PUF, and the following mainly introduces the existing related research. [0003] In terms of PUF-based FPGA core copyright protection, Li et al. [2] proposed to use PUF, data selector and configurable logic to hide the original logic function, so as to prevent illegal attackers from obtaining a complete circuit netlist through reverse engineering attacks. This method is applicable to combinational logic circuits and sequential logic circuits. The simulation results show that this obfuscation method on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/44G06F17/50
Inventor 张大方龙静梁伟谢松佑刘振宇
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products