Ralston et al., 2016 - Google Patents
Defeating counterfeiters with microscopic dielets embedded in electronic componentsRalston et al., 2016
- Document ID
- 4599462353874719621
- Author
- Ralston P
- Fry D
- Suko S
- Winters B
- King M
- Kober R
- Publication year
- Publication venue
- Computer
External Links
Snippet
Supply-chain traceability and electronics counterfeiting have become increasingly widespread issues for military and commercial electronics systems. In response to a DARPA SHIELD program directive, Northrop Grumman is leading a team to develop tiny, passive …
- 230000004044 response 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/58—Structural electrical arrangements for semiconductor devices not otherwise provided for, e.g. in combination with batteries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/57—Protection from inspection, reverse engineering or tampering
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/544—Marks applied to semiconductor devices or parts, e.g. registration marks, alignment structures, wafer maps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L2223/00—Details relating to semiconductor or other solid state devices covered by the group H01L23/00
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ralston et al. | Defeating counterfeiters with microscopic dielets embedded in electronic components | |
Guin et al. | Anti-counterfeit techniques: From design to resign | |
US9292710B2 (en) | Apparatus and method for generating identification key | |
CN102224705B (en) | Non-networked rfid-puf authentication | |
US6617172B2 (en) | Semiconductor device having identification number, manufacturing method thereof and electronic device | |
Hori et al. | Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays | |
KR20180102627A (en) | Privacy-preserving, mutual PUF-based authentication protocols | |
US9509306B2 (en) | Tamper resistant IC | |
Goertzel et al. | Integrated circuit security threats and hardware assurance countermeasures | |
US10108925B1 (en) | Chip tracking with marking database | |
van der Leest et al. | Hardware intrinsic security to protect value in the mobile market | |
Yang et al. | UCR: An unclonable chipless RFID tag | |
US11455504B2 (en) | Memristor based storage of asset events | |
Vashistha et al. | Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance | |
Zhou et al. | Desynchronization of self-powered FN tunneling timers for trust verification of IoT supply chain | |
US11194978B2 (en) | Combined radio frequency identification (RFID)-based asset management and component authentication | |
Usami et al. | The µ-chip: An ultra-small 2.45 GHz RFID chip for ubiquitous recognition applications | |
EP3188403B1 (en) | Method for controlling error rate of device-specific information, and program for controlling error rate of device-specific information | |
US8802455B2 (en) | Security-protection of a wafer of electronic circuits | |
Akkaya et al. | Secure chip odometers using intentional controlled aging | |
RU182178U1 (en) | CRYPTOGRAPHIC LABEL | |
Bahar Talukder et al. | A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips | |
Lehtonen et al. | Serialized TID numbers-A headache or a blessing for RFID crackers? | |
Alioto | Aggressive design reuse for ubiquitous zero-trust edge security—From physical design to machine-learning-based hardware patching | |
Druml et al. | Secured miniaturized system-in-package contactless and passive authentication devices featuring NFC |