-
公开(公告)号:US11528152B2
公开(公告)日:2022-12-13
申请号:US17068467
申请日:2020-10-12
Applicant: Raytheon Company
Inventor: Colby K. Hoffman , William T. Jennings , Michelle Moholt
IPC: H04L9/32 , G01R31/319
Abstract: Generally discussed herein are systems, devices, and methods for device verification. A method can include providing, by test equipment (TE), electrical stimulus consistent with a challenge of a challenge response pair (CRP) to a physical unclonable function (PUF) of a device under test (DUT), receiving, by the TE and from the DUT, a response to the electrical stimulus, comparing, by the TE, the provided response to responses to CRPs in a database including PUF CRPs associated with a device identification and a device type, and validating the identity of the DUT when the response of the PUF to the electrical stimulus matches the response of the CRP or invalidating the identity of the electrical device when the response of the PUF does not match the response of the CRP.
-
公开(公告)号:US20230402347A1
公开(公告)日:2023-12-14
申请号:US17837396
申请日:2022-06-10
Applicant: Raytheon Company
Inventor: Nick Angelo , Ashish Mody , Michelle Moholt
IPC: H01L23/48 , H01L23/498 , H01L23/485
CPC classification number: H01L23/481 , H01L23/49827 , H01L23/485
Abstract: An electronic device is provided having a bulk Si layer and an active region positioned on the bulk Si layer. The active region includes at least one semiconductor component defined by a device layout or functions of the electronic device. An opaque structure is positioned on the bulk Si layer or within the bulk Si layer. The opaque structure is configured to prevent visual or IR imaging of the electronic device to determine the device layout or functions.
-
公开(公告)号:US20250030564A1
公开(公告)日:2025-01-23
申请号:US18355957
申请日:2023-07-20
Applicant: Raytheon Company
Inventor: Colby K. Hoffman , Nick Angelo , Cheryl Reid , Steven J. Austin, SR. , Trevor B. Hird , Michelle Moholt
Abstract: Systems, devices, and methods for device or bio-organism authenticity verification are provided. A method can include identifying (i) respective challenges indicating respective stimuli and (ii) a root node hash value, generating the respective stimuli, recording respective responses to the respective electrical stimuli, hashing the respective responses resulting in respective hashed responses, hashing a combination of hashed responses of the respective hashed responses resulting in a key, and comparing the key to the root node hash value.
-
公开(公告)号:US12143516B2
公开(公告)日:2024-11-12
申请号:US17649422
申请日:2022-01-31
Applicant: Raytheon Company
Inventor: Nick Angelo , Michelle Moholt
Abstract: A method of controlling access to a network includes receiving, from a node, a request to access the network. A challenge is sent to the node, the challenge configured to elicit a node fingerprint from the node. The node fingerprint is based on the challenge and on unique characteristic data of a physically unclonable function (PUF), at the node. An expected fingerprint is generated for the node based on the challenge and on characteristic data information associated with the unique characteristic data of the PUF. The characteristic data information is accessed from a location that is independent of and separate from the node. The node is authenticated to the network, to allow the node to access to the network, if the received node fingerprint matches the expected fingerprint. The first node is denied any access to the network if the received node fingerprint does not match the expected fingerprint.
-
公开(公告)号:US20230283487A1
公开(公告)日:2023-09-07
申请号:US17649422
申请日:2022-01-31
Applicant: Raytheon Company
Inventor: Nick Angelo , Michelle Moholt
CPC classification number: H04L9/3278 , H04L9/085 , H04L9/0825 , H04L9/0866
Abstract: A method of controlling access to a network includes receiving, from a node, a request to access the network. A challenge is sent to the node, the challenge configured to elicit a node fingerprint from the node. The node fingerprint is based on the challenge and on unique characteristic data of a physically unclonable function (PUF), at the node. An expected fingerprint is generated for the node based on the challenge and on characteristic data information associated with the unique characteristic data of the PUF. The characteristic data information is accessed from a location that is independent of and separate from the node. The node is authenticated to the network, to allow the node to access to the network, if the received node fingerprint matches the expected fingerprint. The first node is denied any access to the network if the received node fingerprint does not match the expected fingerprint.
-
-
-
-