Nothing Special   »   [go: up one dir, main page]

Ralston et al., 2016 - Google Patents

Defeating counterfeiters with microscopic dielets embedded in electronic components

Ralston et al., 2016

Document ID
4599462353874719621
Author
Ralston P
Fry D
Suko S
Winters B
King M
Kober R
Publication year
Publication venue
Computer

External Links

Snippet

Supply-chain traceability and electronics counterfeiting have become increasingly widespread issues for military and commercial electronics systems. In response to a DARPA SHIELD program directive, Northrop Grumman is leading a team to develop tiny, passive …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H01BASIC ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/0001Technical content checked by a classifier
    • H01L2924/0002Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H01BASIC ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
    • H01L23/00Details of semiconductor or other solid state devices
    • H01L23/58Structural electrical arrangements for semiconductor devices not otherwise provided for, e.g. in combination with batteries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H01BASIC ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
    • H01L23/00Details of semiconductor or other solid state devices
    • H01L23/57Protection from inspection, reverse engineering or tampering
    • HELECTRICITY
    • H01BASIC ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
    • H01L23/00Details of semiconductor or other solid state devices
    • H01L23/544Marks applied to semiconductor devices or parts, e.g. registration marks, alignment structures, wafer maps
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • HELECTRICITY
    • H01BASIC ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
    • H01L2223/00Details relating to semiconductor or other solid state devices covered by the group H01L23/00

Similar Documents

Publication Publication Date Title
Ralston et al. Defeating counterfeiters with microscopic dielets embedded in electronic components
Guin et al. Anti-counterfeit techniques: From design to resign
US9292710B2 (en) Apparatus and method for generating identification key
CN102224705B (en) Non-networked rfid-puf authentication
US6617172B2 (en) Semiconductor device having identification number, manufacturing method thereof and electronic device
Hori et al. Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays
KR20180102627A (en) Privacy-preserving, mutual PUF-based authentication protocols
US9509306B2 (en) Tamper resistant IC
Goertzel et al. Integrated circuit security threats and hardware assurance countermeasures
US10108925B1 (en) Chip tracking with marking database
van der Leest et al. Hardware intrinsic security to protect value in the mobile market
Yang et al. UCR: An unclonable chipless RFID tag
US11455504B2 (en) Memristor based storage of asset events
Vashistha et al. Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance
Zhou et al. Desynchronization of self-powered FN tunneling timers for trust verification of IoT supply chain
US11194978B2 (en) Combined radio frequency identification (RFID)-based asset management and component authentication
Usami et al. The µ-chip: An ultra-small 2.45 GHz RFID chip for ubiquitous recognition applications
EP3188403B1 (en) Method for controlling error rate of device-specific information, and program for controlling error rate of device-specific information
US8802455B2 (en) Security-protection of a wafer of electronic circuits
Akkaya et al. Secure chip odometers using intentional controlled aging
RU182178U1 (en) CRYPTOGRAPHIC LABEL
Bahar Talukder et al. A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips
Lehtonen et al. Serialized TID numbers-A headache or a blessing for RFID crackers?
Alioto Aggressive design reuse for ubiquitous zero-trust edge security—From physical design to machine-learning-based hardware patching
Druml et al. Secured miniaturized system-in-package contactless and passive authentication devices featuring NFC