JP2014528195A - 事物知能通信でpufに基づいた装置間セキュリティ認証装置及び方法 - Google Patents
事物知能通信でpufに基づいた装置間セキュリティ認証装置及び方法 Download PDFInfo
- Publication number
- JP2014528195A JP2014528195A JP2014525936A JP2014525936A JP2014528195A JP 2014528195 A JP2014528195 A JP 2014528195A JP 2014525936 A JP2014525936 A JP 2014525936A JP 2014525936 A JP2014525936 A JP 2014525936A JP 2014528195 A JP2014528195 A JP 2014528195A
- Authority
- JP
- Japan
- Prior art keywords
- terminal device
- key
- security authentication
- public key
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (19)
- 事物知能通信を行う端末装置において、
前記端末装置に埋め込みされ、前記端末装置に関するパスワード認証のための認証キーを生成するPUFと、
前記PUFが生成した前記認証キーを用いて前記端末装置に関するパスワード認証を行う認証部と、
を含む、セキュリティ認証端末装置。 - 前記PUFは、前記セキュリティ認証端末装置の外部と物理的に隔離して前記認証キーは前記セキュリティ認証端末装置の外部に流出されない、請求項1に記載のセキュリティ認証端末装置。
- 事物知能通信を行う端末装置において、
前記端末装置が公開キー暗号化方式で通信するための公開キーを暗証キー暗号化方式で伝達するための暗証キーを提供する暗証キーモジュールと、
前記公開キーを生成するための個人キーを提供する個人キーモジュールと、
を含み、
前記暗証キーモジュール及び前記個人キーモジュールのうち少なくとも1つはPUFを含んで実現される、セキュリティ認証端末装置。 - 過電流印加により遮断されて前記暗証キーが抽出される経路を遮断するフューズ部をさらに含む、請求項3に記載のセキュリティ認証端末装置。
- 前記フューズ部は、前記暗証キーが前記端末装置から最初抽出された後に前記経路を遮断する、請求項4に記載のセキュリティ認証端末装置。
- 前記端末装置のシリアル番号を格納するシリアル番号格納部と、
前記シリアル番号が前記シリアル番号格納部に格納されて前記暗証キーが抽出された後に前記暗証キーが抽出される経路を遮断するフューズ部と、
をさらに含む、請求項3に記載のセキュリティ認証端末装置。 - 前記個人キーを用いて前記公開キーを生成する公開キー生成部をさらに含む、請求項3に記載のセキュリティ認証端末装置。
- 前記セキュリティ認証端末装置は、外部装置が前記公開キー暗号化方式で通信するための外部装置の公開キーを保管し、
前記外部装置からメッセージを受信すると、前記メッセージを前記外部装置の公開キーを用いて復号化する、請求項3に記載のセキュリティ認証端末装置。 - 前記セキュリティ認証端末装置は、前記復号化した場合に前記セキュリティ認証端末装置のシリアル番号の同一性が認められるか否かに応じて前記外部装置の正当性を確認する、請求項8に記載のセキュリティ認証端末装置。
- 事物知能通信を行うセキュリティ認証端末装置を管理するための認証機関装置において、
前記セキュリティ認証端末装置の暗証キー及び前記セキュリティ認証端末装置のシリアル番号を保管するPINリストを含み、
前記認証機関装置は、前記セキュリティ認証端末装置が公開キー暗号化方式で通信するための公開キー及び前記セキュリティ認証端末装置のシリアル番号を前記暗証キーに暗号化したメッセージを送信する場合、これを前記暗証キーを用いて復号化して前記復号化した場合、前記セキュリティ認証端末装置のシリアル番号の同一性が認められるか否かに応じて前記セキュリティ認証端末装置の正当性を確認する、認証機関装置。 - 端末装置が事物知能通信を行うためにセキュリティ認証を行う方法において、
前記端末装置が前記端末装置内に埋め込みされた第1PUFを用いて前記端末装置の個人キーを生成するステップと、
前記端末装置が前記個人キーを用いて前記端末装置がパスワード認証を行うための公開キーを生成するステップと、
前記公開キーを用いて前記端末装置とは異なる外部端末または外部認証機関とパスワード認証を行うステップと、
を含む、セキュリティ認証方法。 - 前記公開キーを暗証キー暗号化方式で外部に伝達するための暗証キーを前記第1PUFと異なる第2PUFを用いて生成するステップと、
前記暗証キーを用いた暗証キー暗号化方式で前記公開キーを前記外部認証機関とやり取りするステップと、
をさらに含む、請求項11に記載のセキュリティ認証方法。 - 前記外部認証機関から公開キー暗号化方式を用いて暗号化されたメッセージを受信するステップと、
前記暗号化されたメッセージを予め格納されていた前記外部認証機関の公開キーを用いて復号化するステップと、
前記復号化したメッセージで前記端末装置のシリアル番号が確認される場合、前記外部認証機関とのセキュリティ認証を完了するステップと、
をさらに含む、請求項11に記載のセキュリティ認証方法。 - 前記端末装置のシリアル番号を格納するシリアル番号格納部に前記シリアル番号が格納され、前記暗証キーが最初抽出された後に前記暗証キーが抽出される経路にあるフューズを遮断するステップをさらに含む、請求項12に記載のセキュリティ認証方法。
- 認証機関装置が第1端末装置と第2端末装置の事物知能通信のための公開キー交換を中継する方法において、
第2端末装置から前記第1端末装置の公開キーが要求されるステップと、
前記第1端末装置の公開キーを前記第2端末装置のシリアル番号と共に前記認証機関装置の個人キーを用いて暗号化して第1暗号化メッセージを生成するステップと、
前記第1暗号化メッセージを前記第2端末装置に送信するステップと、
を含む、セキュリティ認証方法。 - 前記第2端末装置の公開キーを前記第1端末装置のシリアル番号と共に前記認証機関装置の個人キーを用いて暗号化して第2暗号化メッセージを生成するステップと、
前記第2暗号化メッセージを前記第1端末装置に送信するステップと、
をさらに含む、請求項15に記載のセキュリティ認証方法。 - 前記第2端末装置は、前記認証機関装置の個人キーに対応する前記認証機関装置の公開キーを用いて前記第1暗号化メッセージを復号化し、前記復号化した第1暗号化メッセージで前記第2端末装置のシリアル番号が確認される場合に前記送信された第1端末装置の公開キーを信頼する、請求項15に記載のセキュリティ認証方法。
- 前記第1端末装置は、前記認証機関装置の個人キーに対応する前記認証機関装置の公開キーを用いて前記第2暗号化メッセージを復号化し、前記復号化した第2暗号化メッセージで前記第1端末装置のシリアル番号が確認される場合に前記送信された第2端末装置の公開キーを信頼する、請求項16に記載のセキュリティ認証方法。
- 請求項11〜請求項18のいずれか1項に記載の前記セキュリティ認証方法を行うプログラムを収録したコンピュータで読み出し可能な記録媒体。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2011-0081296 | 2011-08-16 | ||
KR20110081296 | 2011-08-16 | ||
KR1020120089227A KR101372719B1 (ko) | 2011-08-16 | 2012-08-16 | 사물지능통신에서 puf에 기반한 장치간 보안 인증 장치 및 방법 |
PCT/KR2012/006518 WO2013025060A2 (ko) | 2011-08-16 | 2012-08-16 | 사물지능통신에서 puf에 기반한 장치간 보안 인증 장치 및 방법 |
KR10-2012-0089227 | 2012-08-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2014528195A true JP2014528195A (ja) | 2014-10-23 |
Family
ID=47897529
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2014525936A Pending JP2014528195A (ja) | 2011-08-16 | 2012-08-16 | 事物知能通信でpufに基づいた装置間セキュリティ認証装置及び方法 |
Country Status (8)
Country | Link |
---|---|
US (1) | US9787670B2 (ja) |
EP (2) | EP2747335B1 (ja) |
JP (1) | JP2014528195A (ja) |
KR (2) | KR101372719B1 (ja) |
CN (2) | CN103748831B (ja) |
ES (1) | ES2615750T3 (ja) |
TW (1) | TWI479870B (ja) |
WO (1) | WO2013025060A2 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016212648A (ja) * | 2015-05-10 | 2016-12-15 | 渡辺 浩志 | 電子装置、電子装置ネットワークユニット、電子装置ネットワーク及びチップ認証方式 |
JP2017028354A (ja) * | 2015-07-16 | 2017-02-02 | 渡辺 浩志 | 電子装置ネットワーク及びチップ認証方式 |
Families Citing this family (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3467716B1 (en) * | 2011-03-31 | 2020-11-04 | ICTK Holdings Co., Ltd. | Apparatus and method for generating a digital value |
JP6030925B2 (ja) * | 2012-11-12 | 2016-11-24 | ルネサスエレクトロニクス株式会社 | 半導体装置及び情報処理システム |
KR20140126787A (ko) * | 2013-04-22 | 2014-11-03 | (주) 아이씨티케이 | PUF 기반 하드웨어 OTP 제공 장치 및 이를 이용한 2-Factor 인증 방법 |
WO2015012667A1 (ko) | 2013-07-26 | 2015-01-29 | (주) 아이씨티케이 | 랜덤성 테스트 장치 및 방법 |
KR20150024676A (ko) | 2013-08-27 | 2015-03-09 | (주) 아이씨티케이 | 반도체 프로세스의 포토 마스크를 변형하여 puf를 생성하는 방법 및 장치 |
KR101504025B1 (ko) * | 2013-09-06 | 2015-03-18 | (주) 아이씨티케이 | 식별 키 생성 장치 및 방법 |
WO2015037886A1 (ko) * | 2013-09-11 | 2015-03-19 | Kim Deoksang | 스마트 칩 인증 장치 및 그 방법 |
KR101489091B1 (ko) * | 2013-09-30 | 2015-02-04 | (주) 아이씨티케이 | 반도체 공정을 이용한 식별키 생성 장치 및 방법 |
KR101457305B1 (ko) | 2013-10-10 | 2014-11-03 | (주) 아이씨티케이 | 식별키 생성 장치 및 방법 |
TWI505131B (zh) * | 2013-11-27 | 2015-10-21 | Userstar Information System Co Ltd | 設備與設備配件驗證系統及方法 |
DE102013227184A1 (de) * | 2013-12-27 | 2015-07-02 | Robert Bosch Gmbh | Verfahren zur Absicherung eines Systems-on-a-Chip |
KR102198499B1 (ko) * | 2013-12-31 | 2021-01-05 | 주식회사 아이씨티케이 홀딩스 | 디지털 값 처리 장치 및 방법 |
KR102186475B1 (ko) * | 2013-12-31 | 2020-12-03 | 주식회사 아이씨티케이 홀딩스 | 랜덤한 디지털 값을 생성하는 장치 및 방법 |
WO2015113138A1 (en) | 2014-01-31 | 2015-08-06 | Teixem Corp. | System and method for performing secure communications |
DE102014204044A1 (de) * | 2014-03-05 | 2015-09-10 | Robert Bosch Gmbh | Verfahren zum Widerrufen einer Gruppe von Zertifikaten |
US10464156B2 (en) * | 2014-03-28 | 2019-11-05 | Illinois Tool Works Inc. | Systems and methods for pairing of wireless control devices with a welding power supply |
EP3920058A1 (en) * | 2014-04-09 | 2021-12-08 | ICTK Holdings Co., Ltd. | Authentication apparatus and method |
WO2015156622A2 (ko) * | 2014-04-09 | 2015-10-15 | (주) 아이씨티케이 | 인증 장치 및 방법 |
TWI575460B (zh) * | 2015-03-23 | 2017-03-21 | 凌通科技股份有限公司 | 識別碼辨識系統以及使用其之識別卡 |
KR101567333B1 (ko) * | 2014-04-25 | 2015-11-10 | 주식회사 크레스프리 | IoT 디바이스의 통신 설정을 위한 이동통신 단말기와 통신설정모듈 및 이동통신 단말기를 이용한 IoT 디바이스의 통신 설정 방법 |
US20160065374A1 (en) | 2014-09-02 | 2016-03-03 | Apple Inc. | Method of using one device to unlock another device |
KR101673163B1 (ko) | 2014-09-30 | 2016-11-08 | 고려대학교 산학협력단 | 듀얼 레일 딜레이 로직을 이용한 물리적 복제 방지 회로 |
US9641400B2 (en) | 2014-11-21 | 2017-05-02 | Afero, Inc. | Internet of things device for registering user selections |
US20160180100A1 (en) | 2014-12-18 | 2016-06-23 | Joe Britt | System and method for securely connecting network devices using optical labels |
US9832173B2 (en) | 2014-12-18 | 2017-11-28 | Afero, Inc. | System and method for securely connecting network devices |
US10291595B2 (en) | 2014-12-18 | 2019-05-14 | Afero, Inc. | System and method for securely connecting network devices |
US9497573B2 (en) * | 2015-02-03 | 2016-11-15 | Qualcomm Incorporated | Security protocols for unified near field communication infrastructures |
US9544768B2 (en) | 2015-03-20 | 2017-01-10 | Hyundai Motor Company | Method and apparatus for performing secure Bluetooth communication |
US9704318B2 (en) | 2015-03-30 | 2017-07-11 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
US10045150B2 (en) | 2015-03-30 | 2018-08-07 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
CA2977428A1 (en) | 2015-04-13 | 2016-10-20 | Visa International Service Association | Enhanced authentication based on secondary device interactions |
US9717012B2 (en) | 2015-06-01 | 2017-07-25 | Afero, Inc. | Internet of things (IOT) automotive device, system, and method |
US9729528B2 (en) * | 2015-07-03 | 2017-08-08 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IOT) system |
US9699814B2 (en) | 2015-07-03 | 2017-07-04 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IoT) system |
US10015766B2 (en) | 2015-07-14 | 2018-07-03 | Afero, Inc. | Apparatus and method for securely tracking event attendees using IOT devices |
JP6532333B2 (ja) | 2015-07-21 | 2019-06-19 | キヤノン株式会社 | 通信装置、通信方法及びプログラム |
JP6570355B2 (ja) * | 2015-07-21 | 2019-09-04 | キヤノン株式会社 | 通信装置、通信方法及びプログラム |
WO2017014614A1 (ko) * | 2015-07-23 | 2017-01-26 | 주식회사 투아이피 | Iot 디바이스의 통신 클라이언트의 동작 방법 및 상기 통신 클라이언트를 포함하는 iot 디바이스 |
KR102125564B1 (ko) * | 2015-07-29 | 2020-06-22 | 삼성전자주식회사 | 디바이스들 간의 통신 방법 및 그 디바이스 |
KR101686167B1 (ko) | 2015-07-30 | 2016-12-28 | 주식회사 명인소프트 | 사물 인터넷 기기의 인증서 배포 장치 및 방법 |
US9793937B2 (en) | 2015-10-30 | 2017-10-17 | Afero, Inc. | Apparatus and method for filtering wireless signals |
EP3373188B1 (en) * | 2015-11-03 | 2020-05-13 | ICTK Holdings Co., Ltd. | Security apparatus and operation method thereof |
KR101678795B1 (ko) | 2015-11-30 | 2016-11-22 | 전삼구 | 블록체인 인증을 이용하는 IoT 기반 사물 관리 시스템 및 방법 |
TWI593602B (zh) * | 2015-12-03 | 2017-08-01 | 新唐科技股份有限公司 | 無人飛行器之電子調速器驗證系統及方法 |
US10178530B2 (en) | 2015-12-14 | 2019-01-08 | Afero, Inc. | System and method for performing asset and crowd tracking in an IoT system |
US10523437B2 (en) * | 2016-01-27 | 2019-12-31 | Lg Electronics Inc. | System and method for authentication of things |
WO2017138797A1 (ko) * | 2016-02-12 | 2017-08-17 | 한양대학교 산학협력단 | 시큐어 시스템 온 칩 |
WO2017138799A1 (ko) * | 2016-02-12 | 2017-08-17 | 한양대학교 산학협력단 | 하드웨어 디바이스 및 그 인증 방법 |
KR102666954B1 (ko) | 2016-02-12 | 2024-05-17 | 한양대학교 산학협력단 | 보안 반도체 칩 및 그 동작 방법 |
US11582215B2 (en) | 2016-06-12 | 2023-02-14 | Apple Inc. | Modifying security state with secured range detection |
US10271209B2 (en) | 2016-06-12 | 2019-04-23 | Apple Inc. | Session protocol for backward security between paired devices |
US11250118B2 (en) | 2016-06-12 | 2022-02-15 | Apple Inc. | Remote interaction with a device using secure range detection |
US11176237B2 (en) | 2016-06-12 | 2021-11-16 | Apple Inc. | Modifying security state with secured range detection |
US10348671B2 (en) * | 2016-07-11 | 2019-07-09 | Salesforce.Com, Inc. | System and method to use a mobile number in conjunction with a non-telephony internet connected device |
CN107689872A (zh) * | 2017-11-24 | 2018-02-13 | 北京中电华大电子设计有限责任公司 | 一种实现物理不可克隆功能的电路结构 |
KR102005111B1 (ko) * | 2017-12-20 | 2019-07-29 | 주식회사 유니로보틱스 | 블록체인시스템을 이용한 사물간 재화 또는 서비스 제공방법 |
US11265151B2 (en) * | 2018-03-09 | 2022-03-01 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Key exchange schemes with addressable elements |
KR102078913B1 (ko) | 2018-03-16 | 2020-04-07 | 주식회사 아도스 | Pki 기반의 사물인터넷 기기 인증방법 및 인증시스템 |
CN108920984B (zh) * | 2018-07-06 | 2021-11-16 | 北京计算机技术及应用研究所 | 一种防克隆篡改安全ssd主控芯片 |
US10778451B2 (en) | 2018-07-30 | 2020-09-15 | United States Of America As Represented By The Secretary Of The Navy | Device and method for hardware timestamping with inherent security |
KR102125133B1 (ko) | 2018-08-08 | 2020-06-19 | 충북대학교 산학협력단 | 메시지 인증 장치 및 방법 |
IT201900007290A1 (it) * | 2019-05-27 | 2020-11-27 | Torino Politecnico | Apparato d'utente e metodo di protezione di dati riservati |
KR102364652B1 (ko) | 2019-08-01 | 2022-02-21 | 한국전자통신연구원 | 화이트박스 암호화를 이용한 puf 기반 사물인터넷 디바이스 인증 장치 및 방법 |
KR102459592B1 (ko) * | 2020-10-06 | 2022-10-28 | 주식회사 아이씨티케이 홀딩스 | 하드웨어 장치의 식별 정보를 생성하고 인증하는 전자 장치 및 이의 동작 방법 |
CN113055183B (zh) * | 2021-03-18 | 2022-04-12 | 电子科技大学 | 一种基于硬件指纹的身份认证和加密传输*** |
CN113114475B (zh) * | 2021-04-23 | 2022-07-05 | 湖北工业大学 | 基于比特自检puf身份认证***及协议 |
KR102491403B1 (ko) | 2021-09-02 | 2023-01-27 | 주식회사 엘지유플러스 | 물리적 복제 불가능 기능 기반 가입자 식별 모듈 보안 강화 방법 및 그를 위한 장치 및 시스템 |
TWI808042B (zh) * | 2022-11-25 | 2023-07-01 | 國立勤益科技大學 | 自動化雙因子驗證密碼擷取及安全傳輸驗證方法及其系統 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02501961A (ja) * | 1987-10-30 | 1990-06-28 | ゲーアーオー・ゲゼルシャフト・フューア・アウトマツィオーン・ウント・オルガニザツィオーン・エムベーハー | 集積回路を備えたデータ・キャリアの信頼性テスト方法 |
WO1999008192A1 (en) * | 1997-08-07 | 1999-02-18 | Hitachi, Ltd. | Semiconductor device |
JP2006173485A (ja) * | 2004-12-17 | 2006-06-29 | Matsushita Electric Ind Co Ltd | 電子デバイス及びその製造方法 |
JP2010045768A (ja) * | 2008-05-30 | 2010-02-25 | Koninkl Kpn Nv | 複数のsim不要通信モジュールからデータを転送する方法 |
JP2010527219A (ja) * | 2007-05-11 | 2010-08-05 | ヴァリディティー センサーズ,インク. | 物理的に複製不可能な機能を用いて電子機器のセキュリティを電子的に確保する方法およびシステム |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5228084A (en) * | 1991-02-28 | 1993-07-13 | Gilbarco, Inc. | Security apparatus and system for retail environments |
US6178506B1 (en) * | 1998-10-23 | 2001-01-23 | Qualcomm Inc. | Wireless subscription portability |
US6555204B1 (en) | 2000-03-14 | 2003-04-29 | International Business Machines Corporation | Method of preventing bridging between polycrystalline micro-scale features |
US6732101B1 (en) * | 2000-06-15 | 2004-05-04 | Zix Corporation | Secure message forwarding system detecting user's preferences including security preferences |
TW512617B (en) * | 2001-03-26 | 2002-12-01 | Inventec Multimedia & Telecom | Subscriber identification module switching system and method therefor |
US7802085B2 (en) * | 2004-02-18 | 2010-09-21 | Intel Corporation | Apparatus and method for distributing private keys to an entity with minimal secret, unique information |
JP2007538320A (ja) * | 2004-05-18 | 2007-12-27 | シルバーブルック リサーチ ピーティワイ リミテッド | 製品アイテムを追跡する方法およびコンピュータシステム |
WO2006023839A2 (en) * | 2004-08-18 | 2006-03-02 | Mastercard International Incorporated | Method and system for authorizing a transaction using a dynamic authorization code |
EP1842203A4 (en) * | 2004-11-12 | 2011-03-23 | Verayo Inc | KEYS OF VOLATILE DEVICES, AND THEIR APPLICATIONS |
JP2009508430A (ja) | 2005-09-14 | 2009-02-26 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 品目の真正性を判定するデバイス、システム及び方法 |
US20090282259A1 (en) * | 2006-04-11 | 2009-11-12 | Koninklijke Philips Electronics N.V. | Noisy low-power puf authentication without database |
JP5113074B2 (ja) | 2006-11-06 | 2013-01-09 | パナソニック株式会社 | 情報セキュリティ装置 |
US9185123B2 (en) * | 2008-02-12 | 2015-11-10 | Finsphere Corporation | System and method for mobile identity protection for online user authentication |
US20110002461A1 (en) * | 2007-05-11 | 2011-01-06 | Validity Sensors, Inc. | Method and System for Electronically Securing an Electronic Biometric Device Using Physically Unclonable Functions |
WO2009079050A2 (en) * | 2007-09-19 | 2009-06-25 | Verayo, Inc. | Authentication with physical unclonable functions |
CN100565562C (zh) * | 2007-10-15 | 2009-12-02 | 北京派瑞根科技开发有限公司 | 电子标签安全认证方法 |
KR100922405B1 (ko) * | 2007-12-24 | 2009-10-16 | 주식회사 도담시스템스 | 인쇄회로기판 보안 및 복제방지회로 |
TW200943897A (en) * | 2008-01-02 | 2009-10-16 | Verayo Inc | Authentication with physical unclonable functions |
KR101861607B1 (ko) * | 2008-01-18 | 2018-05-29 | 인터디지탈 패튼 홀딩스, 인크 | M2m 통신을 인에이블하는 방법 및 장치 |
US7761714B2 (en) * | 2008-10-02 | 2010-07-20 | Infineon Technologies Ag | Integrated circuit and method for preventing an unauthorized access to a digital value |
TWI498827B (zh) | 2008-11-21 | 2015-09-01 | Verayo Inc | 非連網射頻辨識裝置物理不可複製功能之鑑認技術 |
KR101007739B1 (ko) * | 2008-12-03 | 2011-01-13 | 주식회사 케이티 | Fota 서비스 제공 방법 및 그 시스템 |
KR101080293B1 (ko) * | 2009-01-13 | 2011-11-09 | 창신정보통신(주) | 무선 센서 네트워크에서의 악성 노드 탐지 장치 및 탐지 방법 |
EP2526505B1 (en) * | 2010-01-20 | 2015-06-17 | Intrinsic ID B.V. | Device and method for obtaining a cryptographic key |
US8516269B1 (en) * | 2010-07-28 | 2013-08-20 | Sandia Corporation | Hardware device to physical structure binding and authentication |
US8694778B2 (en) * | 2010-11-19 | 2014-04-08 | Nxp B.V. | Enrollment of physically unclonable functions |
US8667283B2 (en) * | 2011-05-09 | 2014-03-04 | Verayo, Inc. | Soft message signing |
US20130141137A1 (en) * | 2011-06-01 | 2013-06-06 | ISC8 Inc. | Stacked Physically Uncloneable Function Sense and Respond Module |
US8762723B2 (en) * | 2011-07-07 | 2014-06-24 | Verayo, Inc. | Cryptographic security using fuzzy credentials for device and server communications |
-
2012
- 2012-08-16 JP JP2014525936A patent/JP2014528195A/ja active Pending
- 2012-08-16 CN CN201280040144.9A patent/CN103748831B/zh active Active
- 2012-08-16 US US14/238,946 patent/US9787670B2/en active Active
- 2012-08-16 KR KR1020120089227A patent/KR101372719B1/ko active IP Right Grant
- 2012-08-16 EP EP12824527.1A patent/EP2747335B1/en active Active
- 2012-08-16 CN CN201710495108.6A patent/CN107579828A/zh active Pending
- 2012-08-16 ES ES12824527.1T patent/ES2615750T3/es active Active
- 2012-08-16 EP EP16200543.3A patent/EP3206330B1/en active Active
- 2012-08-16 TW TW101129804A patent/TWI479870B/zh active
- 2012-08-16 WO PCT/KR2012/006518 patent/WO2013025060A2/ko active Application Filing
-
2013
- 2013-10-08 KR KR1020130120059A patent/KR101952601B1/ko active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02501961A (ja) * | 1987-10-30 | 1990-06-28 | ゲーアーオー・ゲゼルシャフト・フューア・アウトマツィオーン・ウント・オルガニザツィオーン・エムベーハー | 集積回路を備えたデータ・キャリアの信頼性テスト方法 |
WO1999008192A1 (en) * | 1997-08-07 | 1999-02-18 | Hitachi, Ltd. | Semiconductor device |
JP2006173485A (ja) * | 2004-12-17 | 2006-06-29 | Matsushita Electric Ind Co Ltd | 電子デバイス及びその製造方法 |
JP2010527219A (ja) * | 2007-05-11 | 2010-08-05 | ヴァリディティー センサーズ,インク. | 物理的に複製不可能な機能を用いて電子機器のセキュリティを電子的に確保する方法およびシステム |
JP2010045768A (ja) * | 2008-05-30 | 2010-02-25 | Koninkl Kpn Nv | 複数のsim不要通信モジュールからデータを転送する方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016212648A (ja) * | 2015-05-10 | 2016-12-15 | 渡辺 浩志 | 電子装置、電子装置ネットワークユニット、電子装置ネットワーク及びチップ認証方式 |
JP2017028354A (ja) * | 2015-07-16 | 2017-02-02 | 渡辺 浩志 | 電子装置ネットワーク及びチップ認証方式 |
Also Published As
Publication number | Publication date |
---|---|
WO2013025060A3 (ko) | 2013-04-11 |
KR20130129334A (ko) | 2013-11-28 |
EP3206330A1 (en) | 2017-08-16 |
TW201342868A (zh) | 2013-10-16 |
EP3206330B1 (en) | 2018-12-26 |
EP2747335A4 (en) | 2015-05-27 |
TWI479870B (zh) | 2015-04-01 |
KR20130019358A (ko) | 2013-02-26 |
US20140310515A1 (en) | 2014-10-16 |
ES2615750T3 (es) | 2017-06-08 |
US9787670B2 (en) | 2017-10-10 |
EP2747335A2 (en) | 2014-06-25 |
KR101952601B1 (ko) | 2019-06-03 |
CN103748831A (zh) | 2014-04-23 |
KR101372719B1 (ko) | 2014-03-19 |
WO2013025060A2 (ko) | 2013-02-21 |
CN107579828A (zh) | 2018-01-12 |
EP2747335B1 (en) | 2017-01-11 |
CN103748831B (zh) | 2017-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101952601B1 (ko) | 사물지능통신에서 puf에 기반한 장치간 보안 인증 장치 및 방법 | |
US10154021B1 (en) | Securitization of temporal digital communications with authentication and validation of user and access devices | |
Alizai et al. | Improved IoT device authentication scheme using device capability and digital signatures | |
CN105389500A (zh) | 利用一个设备解锁另一个设备的方法 | |
KR20140126787A (ko) | PUF 기반 하드웨어 OTP 제공 장치 및 이를 이용한 2-Factor 인증 방법 | |
EP2805298B1 (en) | Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests | |
CN107438230A (zh) | 安全无线测距 | |
CN107404472A (zh) | 用户发起的加密密钥的迁移 | |
CN105072110A (zh) | 一种基于智能卡的双因素远程身份认证方法 | |
CN104820807B (zh) | 一种智能卡数据处理方法 | |
Diedhiou et al. | An IoT mutual authentication scheme based on PUF and blockchain | |
Alliance | Embedded hardware security for IoT applications | |
CN104780049B (zh) | 一种安全读写数据的方法 | |
CN104915689B (zh) | 一种智能卡信息处理方法 | |
KR101947408B1 (ko) | PUF 기반 하드웨어 OTP 제공 장치 및 이를 이용한 2-Factor 인증 방법 | |
Nishimura et al. | Secure authentication key sharing between personal mobile devices based on owner identity | |
CN115361147A (zh) | 设备注册方法及装置、计算机设备、存储介质 | |
EP3035589A1 (en) | Security management system for authenticating a token by a service provider server | |
Sameni et al. | Analysis of Attacks in Authentication Protocol IEEE 802.16 e | |
El Makhtoum et al. | Review and evaluation of OTP-based authentication schemes in the metering systems of smart grids | |
Tanwar et al. | A Novel Framework for Efficient Multiple Signature on Certificate with Database Security | |
Saha et al. | Towards Resolving Privacy and Security Issues in IoT-Based Cloud Computing Platforms for Smart City Applications | |
CN118233193A (zh) | 物联网设备的身份认证方法、密钥存储方法及装置 | |
CN110225515A (zh) | 一种认证管理***、方法及装置 | |
Atzeni et al. | Authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20150813 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20160720 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20160726 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20161026 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170125 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20170808 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20170914 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180208 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20180306 |