Abstract:
One feature pertains to a near field communication (NFC) target device comprising a memory circuit adapted to store sensitive data, an NFC interface adapted to transmit and receive information using NFC protocols, and a processing circuit. The processing circuit receives a plurality of provider identification (PID) numbers from a plurality of providers, where each PID number is associated with a different provider. The processing circuit also stores the PID numbers at the memory circuit, and assigns a privilege mask to each PID number received and stored. The NFC target device may also include a physical unclonable function (PUF) circuit. The processing circuit may additionally provide one or more PID numbers as input challenges to the PUF circuit, and receive one or more PUF output responses from the PUF circuit, where the PUF output responses are different from one another and are associated with different providers.
Abstract:
Techniques for encrypting data are provided that can be used to help prevent side-channel attacks on the cryptographic algorithms. An example method according to these techniques includes permuting an order of first intermediate data according to a predetermined permutation to produce permuted intermediate data. The first inter mediate data is output by one or more first stages of a cryptographic algorithm. The method also includes permuting a key to be used by one or more second stages of a cryptographic algorithm according to the predetermined permutation, applying the one or more second stages of a cryptographic algorithm to the permuted intermediate data to generate second intermediate data, the one or more second stages of the cryptographic algorithm using the permuted key, and permuting the second intermediate data according to an inverse permutation of the predetermined permutation to generate output.
Abstract:
One feature pertains to a method of implementing a physically unclonable function (PUF). The method includes exposing an array of magnetoresistive random access memory (MRAM) cells to an orthogonal external magnetic field. The MRAM cells are each configured to represent one of a first logical state and a second logical state, and the orthogonal external magnetic field is oriented in an orthogonal direction to an easy axis of a free layer of the MRAM cells to place the MRAM cells in a neutral logical state that is not the first logical state or the second logical state. The method further includes removing the orthogonal external magnetic field to place each of the MRAM cells of the array randomly in either the first logical state or the second logical state.
Abstract:
One feature pertains to a method for implementing a physically unclonable function (PUF). The method includes providing an array of magnetoresistive random access memory (MRAM) cells, where the MRAM cells are each configured to represent one of a first logical state and a second logical state. The array of MRAM cells are un-annealed and free from exposure to an external magnetic field oriented in a direction configured to initialize the MRAM cells to a single logical state of the first and second logical states. Consequently, each MRAM cell has a random initial logical state of the first and second logical states. The method further includes sending a challenge to the MRAM cell array that reads logical states of select MRAM cells of the array, and obtaining a response to the challenge from the MRAM cell array that includes the logical states of the selected MRAM cells of the array.
Abstract:
One feature pertains to a computing device that includes an input interface, a communication interface, and a processing circuit that is adapted to receive a request from an application to authorize an action and generate a dynamic access code associated with the action. The processing circuit also transmits a message to a secondary display device that includes information data associated with the action and the dynamic access code for display on a display of the secondary display device. The processing circuit authorizes the action received from the application if the dynamic access code is entered into the input interface. Multiple, unique dynamic codes may also be associated with different actions the application may make requests for, which are also transmitted to the secondary display device for display.
Abstract:
One feature pertains to a computing device that includes an input interface, a communication interface, and a processing circuit that is adapted to receive a request from an application to authorize an action and generate a dynamic access code associated with the action. The processing circuit also transmits a message to a secondary display device that includes information data associated with the action and the dynamic access code for display on a display of the secondary display device. The processing circuit authorizes the action received from the application if the dynamic access code is entered into the input interface. Multiple, unique dynamic codes may also be associated with different actions the application may make requests for, which are also transmitted to the secondary display device for display.
Abstract:
An authentication device is provided that authenticates an electronic device based on the responses from distinct types of physically unclonable functions. The authentication device receives a device identifier associated with the electronic device. It then sends one or more challenges to the electronic device. In response, the authentication device receives one or more responses from the electronic device, the one or more responses including characteristic information generated from two or more distinct types of physically unclonable functions in the electronic device.
Abstract:
One feature pertains to a method of implementing a physically unclonable function (PUF). The method includes exposing an array of magnetoresistive random access memory (MRAM) cells to an orthogonal external magnetic field. The MRAM cells are each configured to represent one of a first logical state and a second logical state, and the orthogonal external magnetic field is oriented in an orthogonal direction to an easy axis of a free layer of the MRAM cells to place the MRAM cells in a neutral logical state that is not the first logical state or the second logical state. The method further includes removing the orthogonal external magnetic field to place each of the MRAM cells of the array randomly in either the first logical state or the second logical state.
Abstract:
Techniques for operating a computer system for a vehicle are provided. An example method according to these techniques includes observing usage of at least one component of the computer system by an application to generate an application usage log for the application, deriving behavior vectors from the application usage log, determining whether the application is a distracting application by comparing the behavior vectors to one or more application safety rules, and limiting execution of the application responsive to determining that the application is a distracting application and based on status information associated with the vehicle.
Abstract:
A method is provided for using obtaining a reproducible device identifier from a physically unclonable function. An authentication device may receive a first physically unclonable function (PUF) dataset from the electronic device, the first PUF dataset including characteristic information generated from a physically unclonable function in the electronic device. The authentication device may then identify a pre-stored PUF dataset corresponding to the electronic device. Authentication of the electronic device may be performed by correlating the pre-stored PUF dataset and the first PUF dataset for the electronic device, wherein such correlation is based on a pattern or distribution correlation the pre-stored PUF dataset and the first PUF dataset. Because such correlation is performed on datasets, and not individual points, systematic variations can be recognized by the correlation operation leading to higher correlation than point-by-point comparisons.