An Identity Authentication and Encrypted Transmission System Based on Hardware Fingerprint

A hardware fingerprint and encrypted transmission technology, which is applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as complex management and large storage capacity of certificates, and achieve complex management, large storage capacity, and reduced The effect of storage

Active Publication Date: 2022-04-12
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to overcome the deficiencies of the prior art, provide a hardware-based fingerprint-based identity authentication and encrypted transmission system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity Authentication and Encrypted Transmission System Based on Hardware Fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0034] Such as figure 1 As shown, a hardware fingerprint-based identity authentication and encrypted transmission system of the present invention includes a hardware fingerprint-based device and a management center;

[0035] Devices based on hardware fingerprints are equipped with physical unclonable functions (PUF), entropy value extraction modules, multiple fingerprint extraction modules, protocol management and transmission control modules;

[0036] The entropy value extraction module is used to extract random numbers meeting requirements from physical unclonable functions;

[0037] The compound fingerprint extraction module is used to process the random numbers extracted from the physical unclonable function by using an asymmetric algorithm, and generate compound hardware fingerprints including explicit fingerprints and implicit fingerpri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication and encrypted transmission system based on hardware fingerprints, which includes a device based on hardware fingerprints and a management center; the device based on hardware fingerprints is provided with sequentially connected physical unclonable functions, entropy value extraction modules, and multiple fingerprints. Extraction module, protocol management and transmission control module; the management center is used to complete the registration of new devices and the distribution of explicit fingerprints. The invention only needs to store legal explicit fingerprints, which solves the problems of large certificate storage and complicated management; adopts double fingerprints (explicit fingerprints and implicit fingerprints) to solve the security problem caused by hardware fingerprint leakage.

Description

technical field [0001] The invention belongs to the field of computers and integrated circuits, in particular to an identity authentication and encrypted transmission system based on hardware fingerprints. Background technique [0002] Physical Unclonable Functions (Physical Unclonable Functions, PUF) refers to the generation of a specific response determined by the physical characteristics of the circuit under a given input, also known as "hardware fingerprint". The physical unclonable function comes from the specific physical information introduced by factors such as process deviation during the chip manufacturing process. Since these factors are unpredictable and difficult to control, the response output is theoretically unclonable. The characteristics of PUF mainly include unclonability, uniqueness, unpredictability, lightweight and tamper-proof, so it is very suitable for identification of chips. The PUF system is essentially a combination of microcircuits, which can e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08G06F21/73
CPCH04L9/3268H04L9/0866H04L9/0869G06F21/73
Inventor 李磊李进周婉婷
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products