This disclosure relates generally to devices comprising stress-engineered substrates configured to fracture in response to an applied energy and to related methods and systems.
Electronic systems capable of fracturing in a controlled, triggerable manner are useful in a variety of applications, such as maintaining security and supply chain integrity.
Some embodiments are directed to a system that includes a stress-engineered substrate. The stress-engineered substrate comprises at least one tensile stress layer having a residual tensile stress and at least one compressive stress layer having a residual compressive stress. The at least one tensile layer and the at least one compressive layer are coupled such that the at least one tensile stress layer and the at least one compressive stress layer are self-equilibrating. At least one functional device is disposed on the stress-engineered substrate. The stress-engineered substrate is configured to fracture in response to energy applied to the stress-engineered substrate. Fracturing the stress-engineered substrate also fractures the functional device. The system includes at least one decoy device. Fragments of the decoy device are configured to obscure one or more physical characteristics of the functional device and/or one or more functional characteristics of the functional device after the functional device is fractured.
Some embodiments involve a method of maintaining the security of a functional device. Energy is applied to a stress-engineered substrate having at least one functional device disposed thereon. The stress-engineered substrate comprises at least one tensile stress layer having a residual tensile stress and at least one compressive stress layer having a residual compressive stress. The at least one tensile layer and the at least one compressive layer are coupled such that the at least one tensile stress layer and the at least one compressive stress layer are self-equilibrating. The applied energy creates an initial fracture in the stress-engineered substrate. The initial fracture generates propagating fractures in the stress-engineered substrate. The propagating fractures fragment the substrate and the functional device. One or more functional characteristics and/or one or more physical characteristics of the functional device are obscured by fragments of a decoy device.
The above summary is not intended to describe each embodiment or every implementation. A more complete understanding will become apparent and appreciated by referring to the following detailed description and claims in conjunction with the accompanying drawings.
The figures are not necessarily to scale. Like numbers used in the figures refer to like components. However, it will be understood that the use of a number to refer to a component in a given figure is not intended to limit the component in another figure labeled with the same number.
Stress-engineered substrate technology can be used to fragment devices such as integrated circuits into smaller pieces to prevent a hostile party from obtaining information about the devices. Depending on the size of the fragmentation, the ability to reconstruct the devices and/or retrieve data stored in the devices will vary. Embodiments disclosed herein relate to additional measures beyond fragmentation that can be used to create confusion for the hostile party. These additional measures make it more difficult for the hostile party to extract information such as circuit design and/or stored data from fragmented chips.
The functional 120 and the decoy 130 devices may be any type of devices. The functional device 120 may comprise one or more integrated circuits and the decoy device 130 may comprise one or more integrated circuits. In some embodiments, the functional 120 and decoy 130 devices are integrated circuits fabricated using well-known low-cost fabrication techniques (e.g., CMOS or SOI), for example.
The substrate 110 is stressed such that when a small initial fracture is created in the substrate 110, the initial fracture causes propagating fractures that transmit through the substrate 110. When the functional 120 and decoy 130 devices are co-located on the same substrate 110 as in
The decoy device 130 may be positioned relative to the functional device 120 so that when fragmentation occurs, the fragments of the decoy device 130 mix with the fragments of the functional device 120. For example, the decoy device 130 may be placed near the functional device 120 so that when fragmentation of the functional 120 and decoy 130 devices occurs, the fragments of the decoy device 130 mix with the fragments of the functional device 120 making reconstitution of the functional device difficult to accomplish.
The system may be configured such that fragmentation occurs of functional device 120 and the decoy device 130 occurs substantially simultaneously or close in time. In some embodiments, the decoy device 130 may fragment before and/or or after fragmentation of the functional device 120. In some embodiments, the system 100 may include multiple decoy devices 130, at least one of the multiple decoy devices 130 arranged to fragment before fragmentation of the functional device 120 and at least another of the multiple decoy devices 130 arranged to fragment after fragmentation of the functional device 120.
The decoy device 130 is designed to create confusion if an attempt is made to reassemble the pieces 123 to reconstitute and/or reanimate the functional device 120 after the functional device 120 is fragmented. The decoy device 130 may be designed to obscure physical and/or functional characteristics of the functional device after the decoy device 130 and the functional device 120 are fragmented. For example, the decoy device 130 may obscure one or more physical characteristics of the functional device such as mass, size, shape, material, and/or coatings of the functional device 120.
The functional and decoy device may be fragmented in a way that makes it difficult to distinguish which fragments belong to the functional device and which fragments belong to the decoy device. Such fragmentation makes it difficult to discern the mass, size or shape of the functional device from the fragments 123 of the decoy device 130 and the functional device 120.
In some embodiments, the decoy device 130 is composed entirely of the same materials as the functional device 120. Alternatively, the decoy device 130 may include one or more materials some or all of which are different from the materials of the functional device 120. For example, the decoy device 130 may include one or more decoy materials wherein the decoy materials are not needed to support or enhance the functionality of the functional device. In some embodiments, both the functional 120 and the decoy 130 devices may include the decoy materials.
According to some implementations, the functional device 120 comprises one or more first coatings and the decoy device comprises one or more second coatings. Some or none of the second coatings may be the same as the first coatings of the functional device. For example, the decoy device and/or the functional device may comprise decoy coatings.
In some embodiments, when the functional device 120 is fragmented, the fragments of the functional device 120 have a first thickness or a plurality of first thicknesses. When the decoy device is fragmented, the fragments of the decoy device 130 may comprise fragments have a second thickness or a plurality of second thicknesses different from the first thicknesses. In some implementations, fragments of the functional device may include some of the second thicknesses and/or fragments of the decoy device may include some of the first thicknesses.
The decoy device 130 may obscure one or more functional characteristics of the functional device 120 such as circuit design, circuit operation and/or data stored in the functional device 120. In some embodiments, the decoy device 130 may include decoy circuits that are different from the circuits of the functional device 120. The decoy circuits may be arranged such that the circuit design and/or circuit operation of the functional device 120 is obscured by the decoy circuits when both the decoy device 130 and functional device 120 are fragmented.
In some embodiments, the decoy device 130 includes one or more integrated circuits that are identical to or similar to the integrated circuits of the functional device 120. The decoy device circuits store data that is different from the data stored in the integrated circuits of the functional device 120. The data stored in the decoy device 130 may corrupt the data stored in the functional device 120 when both devices 120, 130 when a hostile party tries to reconstitute the data stored in the functional device 120 from the fragments 123. For example, in some embodiments the data stored in the decoy device 130 may be null data.
The decoy device need not be on the same substrate as the functional device.
As depicted in
According to some embodiments, as shown in
The process used in preparing the stress-engineered substrate, e.g., chemical tempering, imparts a large stress gradient within the thickness of the support substrate. This stored mechanical energy is abruptly released when an initial fracture is formed. In some embodiments discussed below, the initial fracture is caused when a localized area is heated. For example, rapid heating and subsequent cooling damage the substrate leading to the initial fracture and propagating fractures.
As shown in the cross sectional view of
Various methods may be used to fabricate the stress-engineered substrate. One example approach involves thin film sputter deposition. In thin film sputter deposition, generally two distinct regimes can be identified leading to very different film morphology and characteristics, and result in either compressive or tensile stress. Metals are often used because of functionality (e.g., electrical properties), their structural qualities (e.g., ductility), and the fact that a conductive sputter target allows for a simple, high yield, glow discharge DC magnetron sputtering process. However, stress-engineered metal oxides and glasses (silicon oxides) can be sputtered as well; these insulating or semiconducting films can be sputter deposited by either radiofrequency (RF) sputtering or by reactive sputtering in a mixed inert/reactive gas plasma (e.g. argon/oxygen).
To achieve reliable fragmentation of the stress-engineered substrate, a method for generating stressed support substrates involves adapting stress-engineered thin film fabrication techniques with ion-exchange tempering to create stress profiles in glass (SiO2) substrates, e.g., glass (SiO2) substrates.
According to a fourth methodology, a hybrid of the above second and third methods is employed in which diced, thin glass core substrates are ion-exchange tempered, and then multiple layers of SiO2 are deposited on the tempered substrates to further increase the induced stresses.
According to some embodiments, the system may also include a triggering mechanism that supplies the energy that create the initial fracture. For example, the trigger mechanism may supply mechanical energy, thermal energy, electrical energy, chemical energy, magnetic energy, and/or optical energy to create the initial fracture. The trigger mechanism may operate in response to a trigger signal that can be generated manually or by a sensor configured to sense a trigger stimuli. The trigger stimuli may comprise one or more of electromagnetic radiation (e.g., radio frequency (RF) radiation, infrared (IR radiation), visible light, ultraviolet (UV) radiation, x-ray radiation, etc.), vibration, a chemical, vapor, gas, sound, temperature, passage of time, moisture, an environmental condition, etc. For embodiments in which the trigger stimulus is visible light, the sensor may be configured to generate the trigger signal in response to exposure to broadband light, such as sunlight or room light, or narrow band light, such as green, red, or blue visible light. For example, the green, red or blue light may be produced by a laser.
In some embodiments, the sensor is configured to detect a tampering event. For example, the tampering event can be detected when the device is exposed to a chemical used for removal of a package cover, the device is vibrated above a threshold vibration, and/or if snooping with x-rays occurs.
In some embodiments, the sensor is a clock that detects the passage of time. After a predetermined amount of time has passed, a trigger signal is generated to activate the trigger mechanism.
In some embodiments, the trigger mechanism may supply mechanical energy to the substrate to form the initial fracture. The initial fracture can be formed by a mechanical impact, e.g. supplied by an electromagnet or other actuator. In some embodiments, the initial fracture can be formed by concurrently creating a weakened region and applying mechanical stress to the substrate sufficient to cause the initial fracture as discussed in commonly owned U.S. patent application Ser. No. 15/981,328 filed May 16, 2018 which is incorporated herein by reference.
The trigger mechanism may supply thermal energy in the form of sudden heating and/or cooling to create the initial fracture as discussed in commonly owned U.S. patent application Ser. Nos. 15/220,164 and 15/220,221 filed Jul. 26, 2016 which are incorporated herein by reference. Electrical energy in the form of current may flow through a resistive heater disposed on the substrate to provide the fracture initiating thermal energy. Alternatively, optical energy in the form of intense laser radiation may be directed to an optical absorber pad on the substrate The intense radiation heats the absorber pad operates as a trigger mechanism that generates heat which provides the fracture initiating thermal energy. In some embodiments, the trigger mechanism may release a chemical which causes a chemical reaction which generates the initial fracture that creates propagating cracks that destroy the substrate and devices disposed thereon.
System 801, 802, 803 includes a stress-engineered substrate 810, a functional device 820, a decoy device, 830, and a trigger mechanism 860. The trigger mechanism 860 is configured to apply energy to the substrate 810 that causes the initial fracture which in turn leads to propagating fractures that fragment the substrate 810, functional device 820, and decoy device 830. For convenience, the trigger mechanism is described as a heater, however, the concepts described with reference to
The heater 860 is thermally coupled to the substrate 810. In some embodiments, the heater 860 is a resistive conductive film that is energized by flowing electrical current. In other embodiments, the heater is energized by radio-frequency-coupled microwave. In yet another embodiment, the heater is an optical absorber energized by an intense laser beam. In the resistive conductive film embodiment, the heater can be a thin film fuse that breaks when the temperature reaches a sufficiently high value.
Trigger circuitry 850 is configured to cause the heater 860 to be coupled to a power source 840 in response to exposure to a trigger stimulus. The trigger circuitry 850 may include a sensor 851 and a switch 852. The sensor 851 generates a trigger signal when exposed to the trigger stimulus. After activation by the trigger signal, the switch 852 electrically couples the power source 840 to the heater 860. When energized by the power source 840, the heater 860 generates heat such that the heating and subsequent cooling of the substrate form an initial fracture of the substrate 810. The initial fracture generates propagating fractures through the substrate 810, functional device 820, and decoy device 830. The substrate 810 is engineered to fracture and break into pieces. In some embodiments, the fracture dynamics are designed so that the substrate 810 fractures into small particles that have length, width, and height dimensions of less than about 900 μm, less than about 500 μm, or even less than about 100 μm.
In one version of the system 801 shown in
Unless otherwise indicated, all numbers expressing feature sizes, amounts, and physical properties used in the specification and claims are to be understood as being modified in all instances by the term “about.” Accordingly, unless indicated to the contrary, the numerical parameters set forth in the foregoing specification and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by those skilled in the art utilizing the teachings disclosed herein. The use of numerical ranges by endpoints includes all numbers within that range (e.g. 1 to 5 includes 1, 1.5, 2, 2.75, 3, 3.80, 4, and 5) and any range within that range.
Various modifications and alterations of the embodiments discussed above will be apparent to those skilled in the art, and it should be understood that this disclosure is not limited to the illustrative embodiments set forth herein. The reader should assume that features of one disclosed embodiment can also be applied to all other disclosed embodiments unless otherwise indicated. It should also be understood that all U.S. patents, patent applications, patent application publications, and other patent and non-patent documents referred to herein are incorporated by reference, to the extent they do not contradict the foregoing disclosure.
This invention is based upon work supported by DARPA under Contract No. HR0011-14-C-0013 DARPA-MTO-VAPR-DUST. The Government has certain rights to this invention.
Number | Name | Date | Kind |
---|---|---|---|
2529210 | Butler | Nov 1950 | A |
3397278 | Pomerantz | Aug 1968 | A |
3601114 | Cook | Aug 1971 | A |
3666967 | Keister et al. | May 1972 | A |
3673667 | Lowenstein et al. | Jul 1972 | A |
3882323 | Smolker | May 1975 | A |
4102664 | Dunbaugh, Jr. | Jul 1978 | A |
4139359 | Johnson et al. | Feb 1979 | A |
4471895 | Lisec, Jr. | Sep 1984 | A |
4558622 | Tausheck | Dec 1985 | A |
4598274 | Holmes | Jul 1986 | A |
4673453 | Georgi | Jun 1987 | A |
4739555 | Jurgens | Apr 1988 | A |
5374564 | Bruel | Dec 1994 | A |
5584219 | Dunn et al. | Dec 1996 | A |
5791056 | Messina | Aug 1998 | A |
6418628 | Steingass | Jul 2002 | B1 |
7002517 | Noujeim | Feb 2006 | B2 |
7068254 | Yamazaki et al. | Jun 2006 | B2 |
7153758 | Hata et al. | Dec 2006 | B2 |
7554085 | Lee | Jun 2009 | B2 |
7880248 | Pham et al. | Feb 2011 | B1 |
8130072 | De Bruyker et al. | Mar 2012 | B2 |
8740030 | Purdy et al. | Jun 2014 | B2 |
9154138 | Limb et al. | Oct 2015 | B2 |
9294098 | Shah et al. | Mar 2016 | B2 |
9356603 | Limb et al. | May 2016 | B2 |
9577047 | Chua et al. | Feb 2017 | B2 |
9630870 | Zhao et al. | Apr 2017 | B2 |
9780044 | Limb et al. | Oct 2017 | B2 |
9790128 | Garner et al. | Oct 2017 | B2 |
10012250 | Limb et al. | Jul 2018 | B2 |
10026579 | Whiting et al. | Jul 2018 | B2 |
10026651 | Limb et al. | Jul 2018 | B1 |
10308543 | Lee | Jun 2019 | B2 |
10717669 | Murphy et al. | Jul 2020 | B2 |
20030089755 | Peers-Smith et al. | May 2003 | A1 |
20040031966 | Forrest | Feb 2004 | A1 |
20040222500 | Aspar et al. | Nov 2004 | A1 |
20050061032 | Yoshizawa | Mar 2005 | A1 |
20050082331 | Yang | Apr 2005 | A1 |
20050084679 | Sglavo et al. | Apr 2005 | A1 |
20050176573 | Thoma et al. | Aug 2005 | A1 |
20060138798 | Oehrlein | Jun 2006 | A1 |
20060270190 | Nastasi et al. | Nov 2006 | A1 |
20070113886 | Arao et al. | May 2007 | A1 |
20080029195 | Lu | Feb 2008 | A1 |
20080311686 | Morral et al. | Dec 2008 | A1 |
20090086170 | El-Ghoroury et al. | Apr 2009 | A1 |
20090224401 | Fujii | Sep 2009 | A1 |
20100035038 | Barefoot et al. | Feb 2010 | A1 |
20100133641 | Kim | Jun 2010 | A1 |
20100225380 | Hsu et al. | Sep 2010 | A1 |
20110048756 | Shi et al. | Mar 2011 | A1 |
20110089506 | Hoofman et al. | Apr 2011 | A1 |
20110183116 | Hung et al. | Jul 2011 | A1 |
20120052252 | Kohli et al. | Mar 2012 | A1 |
20120135177 | Comejo et al. | May 2012 | A1 |
20120135195 | Glaesemann et al. | May 2012 | A1 |
20120196071 | Comejo et al. | Aug 2012 | A1 |
20120288676 | Sondergard et al. | Nov 2012 | A1 |
20130037308 | Wang et al. | Feb 2013 | A1 |
20130082383 | Aoya | Apr 2013 | A1 |
20130140649 | Rogers et al. | Jun 2013 | A1 |
20130192305 | Black et al. | Aug 2013 | A1 |
20130273717 | Hwang et al. | Oct 2013 | A1 |
20140091374 | Assefa et al. | Apr 2014 | A1 |
20140103957 | Fritz et al. | Apr 2014 | A1 |
20140266946 | Billy et al. | Sep 2014 | A1 |
20140300520 | Nguyen et al. | Oct 2014 | A1 |
20140323968 | Rogers et al. | Oct 2014 | A1 |
20150001733 | Karhade | Jan 2015 | A1 |
20150044445 | Garner et al. | Feb 2015 | A1 |
20150076677 | Ebefors | Mar 2015 | A1 |
20150089977 | Li | Apr 2015 | A1 |
20150102852 | Limb et al. | Apr 2015 | A1 |
20150121964 | Zhao et al. | May 2015 | A1 |
20150229028 | Billy et al. | Aug 2015 | A1 |
20150232369 | Majanovic et al. | Aug 2015 | A1 |
20150318618 | Chen et al. | Nov 2015 | A1 |
20150348940 | Woychik | Dec 2015 | A1 |
20150358021 | Limb | Dec 2015 | A1 |
20150372389 | Chen et al. | Dec 2015 | A1 |
20160122225 | Wada et al. | May 2016 | A1 |
20160137548 | Cabral, Jr. et al. | May 2016 | A1 |
20170036942 | Abramov et al. | Feb 2017 | A1 |
20170217818 | Dumenil et al. | Aug 2017 | A1 |
20170292546 | Limb et al. | Oct 2017 | A1 |
20180005963 | Limb et al. | Jan 2018 | A1 |
20180033577 | Whiting et al. | Feb 2018 | A1 |
20180033742 | Chua et al. | Feb 2018 | A1 |
20180114761 | Chua et al. | Apr 2018 | A1 |
20180306218 | Limb et al. | Oct 2018 | A1 |
20180330907 | Whiting et al. | Nov 2018 | A1 |
20190106069 | Wheeler et al. | Apr 2019 | A1 |
Number | Date | Country |
---|---|---|
102004015546 | Oct 2005 | DE |
0143228 | Jun 2001 | WO |
Entry |
---|
File History for U.S. Appl. No. 15/229,385. |
File History for U.S. Appl. No. 16/433,603. |
File History for U.S. Appl. No. 15/981,328. |
File History for U.S. Appl. No. 16/273,397. |
File History for U.S. Appl. No. 16/033,783. |
File History for U.S. Appl. No. 15/299,385. |
File History for U.S. Appl. No. 15/092,313. |
File History for U.S. Appl. No. 15/220,221. |
File History for U.S. Appl. No. 15/629,506. |
File History for U.S. Appl. No. 15/726,944. |
File History for U.S. Appl. No. 16/025,573. |
Limb et al., U.S. Appl. No. 15/726,944, filed Oct. 6, 2017. |
Murphy et al., U.S. Appl. No. 15/981,328, filed May 16, 2018. |
File History for U.S. Appl. No. 14/796,440, 183 pages. |
File History for U.S. Appl. No. 15/220,221, 198 pages. |
File History for U.S. Appl. No. 15/220,164 192 pages. |
File History for U.S. Appl. No. 15/629,506, 121 pages. |
File History for U.S. Appl. No. 15/726,944, 145 pages. |
File History for U.S. Appl. No. 15/689,566, 167 pages. |
File History for U.S. Appl. No. 15/092,313, 195 pages. |
Office Action from U.S. Appl. No. 16/204,996 dated Sep. 3, 2020, 18 pages. |
File History for U.S. Appl. No. 16/257,304. |
Number | Date | Country | |
---|---|---|---|
20200172430 A1 | Jun 2020 | US |