Watermarking for electronic device tracking or verification

    公开(公告)号:US11528152B2

    公开(公告)日:2022-12-13

    申请号:US17068467

    申请日:2020-10-12

    Abstract: Generally discussed herein are systems, devices, and methods for device verification. A method can include providing, by test equipment (TE), electrical stimulus consistent with a challenge of a challenge response pair (CRP) to a physical unclonable function (PUF) of a device under test (DUT), receiving, by the TE and from the DUT, a response to the electrical stimulus, comparing, by the TE, the provided response to responses to CRPs in a database including PUF CRPs associated with a device identification and a device type, and validating the identity of the DUT when the response of the PUF to the electrical stimulus matches the response of the CRP or invalidating the identity of the electrical device when the response of the PUF does not match the response of the CRP.

    ELECTRONIC DEVICE TRACKING OR VERIFICATION

    公开(公告)号:US20250030564A1

    公开(公告)日:2025-01-23

    申请号:US18355957

    申请日:2023-07-20

    Abstract: Systems, devices, and methods for device or bio-organism authenticity verification are provided. A method can include identifying (i) respective challenges indicating respective stimuli and (ii) a root node hash value, generating the respective stimuli, recording respective responses to the respective electrical stimuli, hashing the respective responses resulting in respective hashed responses, hashing a combination of hashed responses of the respective hashed responses resulting in a key, and comparing the key to the root node hash value.

    Hardware based authentication and authorization of networked nodes

    公开(公告)号:US12143516B2

    公开(公告)日:2024-11-12

    申请号:US17649422

    申请日:2022-01-31

    Abstract: A method of controlling access to a network includes receiving, from a node, a request to access the network. A challenge is sent to the node, the challenge configured to elicit a node fingerprint from the node. The node fingerprint is based on the challenge and on unique characteristic data of a physically unclonable function (PUF), at the node. An expected fingerprint is generated for the node based on the challenge and on characteristic data information associated with the unique characteristic data of the PUF. The characteristic data information is accessed from a location that is independent of and separate from the node. The node is authenticated to the network, to allow the node to access to the network, if the received node fingerprint matches the expected fingerprint. The first node is denied any access to the network if the received node fingerprint does not match the expected fingerprint.

    Hardware Based Authentication And Authorization Of Networked Nodes

    公开(公告)号:US20230283487A1

    公开(公告)日:2023-09-07

    申请号:US17649422

    申请日:2022-01-31

    CPC classification number: H04L9/3278 H04L9/085 H04L9/0825 H04L9/0866

    Abstract: A method of controlling access to a network includes receiving, from a node, a request to access the network. A challenge is sent to the node, the challenge configured to elicit a node fingerprint from the node. The node fingerprint is based on the challenge and on unique characteristic data of a physically unclonable function (PUF), at the node. An expected fingerprint is generated for the node based on the challenge and on characteristic data information associated with the unique characteristic data of the PUF. The characteristic data information is accessed from a location that is independent of and separate from the node. The node is authenticated to the network, to allow the node to access to the network, if the received node fingerprint matches the expected fingerprint. The first node is denied any access to the network if the received node fingerprint does not match the expected fingerprint.

Patent Agency Ranking