Core copyright anonymous authentication method
An anonymous authentication and copyright technology, applied in digital data authentication, instruments, computing, etc., can solve PUF security threats and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The authentication scheme of the present invention adopts a double PUF authentication structure, that is, the FPGA manufacturer adopts the PUF model, and the original PUF is configured in the device. The legal manufacturer sets an access point for the original PUF, through which the manufacturer can collect a sufficient number of stimulus-response pairs, and by modeling and analyzing the collected stimulus-response pairs, the linearity of the PUF structure can be obtained. The delay vector can complete the modeling of the PUF. After the PUF model is established, in order to prevent attackers from using it, the access point will be destroyed and the access point will be permanently prohibited from being used again. Literature [13] pointed out that to build a PUF model with an accuracy rate of 90% and an error rate of 10%, only about a thousand stimulus-response pairs are needed (these PUFs are usually simple PUFs, and the stimulus-response information is fully exposed to ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com