Systems implementing hierarchical levels of security

    公开(公告)号:US10454691B2

    公开(公告)日:2019-10-22

    申请号:US15604376

    申请日:2017-05-24

    Abstract: Systems and methods for providing variable access authentication respond to the need of a hierarchical level of security, which may include the use of multiple physically unclonable functions (PUFs) and/or the distribution of a set of authentication keys with “don't care” states. Each of the multiple PUFs can drive a separate level of access control, while “don't care” states can be included in the authentication keys when the security risk levels are lower. These two methods can be implemented independently, or in a combination for higher levels of security. At one end of the embodiment the IT manager can have backdoor capabilities if a user forgot a password, on the other end access control to an Internet device needs to be extremely stringent when the user operates in unsafe territory.

    PUF HARDWARE ARRANGEMENT FOR INCREASED THROUGHPUT

    公开(公告)号:US20190163897A1

    公开(公告)日:2019-05-30

    申请号:US16201861

    申请日:2018-11-27

    Abstract: The present invention provides a method for authenticating distributed peripherals on a computer network using an array of physically unclonable functions (PUF). As each PUF is unique, each PUF is able to generate a plurality of challenge response pairs that are unique to that PUF. The integrated circuits of the PUF comprise a plurality of cells, where a parameter (such as a voltage) of each cell may be measured (possibly averaged over many readings). The plurality of cells in the PUF may be arranged in a one, two or more dimensional matrix. A protocol based on an addressable PUF generator (APG) allows the protection of a network having distributed peripherals such as Internet of things (IoT), smart phones, lap top and desk top computers, or ID cards. This protection does not require the storage of a database of passwords, or secret keys. and thereby is immune to traditional database hacking attacks.

    ENCODING TERNARY DATA FOR PUF ENVIRONMENTS
    106.
    发明申请

    公开(公告)号:US20180343130A1

    公开(公告)日:2018-11-29

    申请号:US16036498

    申请日:2018-07-16

    Inventor: Bertrand Cambou

    Abstract: The present invention provides a method for authenticating distributed peripherals on a computer network using an array of physically unclonable functions (PUF). As each PUF is unique, each PUF is able to generate a plurality of challenge response pairs that are unique to that PUF. The integrated circuits of the PUF comprise a plurality of cells, where a parameter (such as a voltage) of each cell may be measured (possibly averaged over many readings). The plurality of cells in the PUF may be arranged in a one, two or more dimensional matrix. A protocol based on an addressable PUF generator (APG) allows the protection of a network having distributed peripherals such as Internet of things (IoT), smart phones, lap top and desk top computers, or ID cards. This protection does not require the storage of a database of passwords, or secret keys, and thereby is immune to traditional database hacking attacks.

    PROTOCOLS WITH NOISY RESPONSE-BASED CRYPTOGRAPHIC SUBKEYS

    公开(公告)号:US20250023736A1

    公开(公告)日:2025-01-16

    申请号:US18638593

    申请日:2024-04-17

    Abstract: Methods for the storage and retrieval of a digital file are disclosed. The file is encrypted with a random binary key. A mathematical CRP mechanism is used to generate an ordered list of responses from a list of challenges. A subset of responses within the ordered list of responses is selected, which each selected response occupying a position in the ordered list that is the same position as a first binary symbol in the random key. In this way, the key can be encoded in the selection of responses. To recover the key, the selected responses are compared to a full list of responses to determine which of the responses in the full list match selected responses. Matches indicate the first binary symbol in the corresponding position in the key and non-matches indicate the second binary symbol. In this way, the key is reconstructed, and file may be decrypted.

Patent Agency Ranking