The invention relates to a method for calibrating a device for authenticating a physical token. The invention relates also to an apparatus for calibrating a device for authenticating a physical token. The invention relates also to a computer program product for calibrating a device for authenticating a physical token. The invention relates also to a method for authenticating a physical token at a device using an authentication challenge. The invention relates also to a method for enabling calibrating a device for authenticating a physical token. The invention relates also to a system, a device and a verifier that apply said method for calibrating.
The use of physical tokens for the purpose of identification, authentication and generation of encryption/decryption keys is known in the art. A token can be embedded in e.g. a smart card and used in secure transactions. Before issuing such a card to a user, the token is enrolled in the so-called “enrolment phase” by being subjected to one or more challenges. The challenges and the corresponding responses are stored together with information identifying the token, possibly along with other data, so as to form the “enrolment data”. When the smart card is used by the user, in the so-called “authentication phase” the identity of the token is verified by challenging the token with one or more of the stored challenges corresponding to the information identifying the token. If the response or responses obtained are the same as the response or responses stored in the enrolment data, the identification is successful. In some protocols, this challenge-response procedure also results in a shared secret that is derived from the responses by some processing that converts the physical output of a token to a bit string. The shared secret can then be used as a session key for secure transactions between two parties.
There are many examples of physical tokens: planar fiber distributions (as e.g. referenced in the proceedings of the IEEE ISIT conference 2004, p173), in principle all biometrics like fingerprints, iris scan, earprints, and in particular Physical Uncloneable Functions (PUFs). By “physical token” we denote, in general, a physical object that is probed by means other than memory access, and the response depends on the physical structure of the object. The direct, unprocessed response of the physical token can be either analog or digital. The response can be processed to obtain a digital bit string. In contrast, a digital token consists of a digital memory having stored a response for a given set of challenges, e.g. a bit string that has been written into it at every address.
PUFs are also known as Physical Random Functions or Physical One-Way Functions. U.S. Patent Application 2003/0204743 describes the use of devices with unique measurable characteristics together with a measurement module for authentication purposes. Another method of authentication based on 3D structures, probing, and comparison is described in the U.S. Pat. No. 6,584,214. In general, PUFs are physical tokens that are extremely hard to clone, where “cloning” can be either (i) producing a physical copy, or (ii) creating a computer model that mimics the behavior. PUFs are complex physical systems comprising many randomly distributed components. When probed with suitable challenges, the complex physics governing the interaction between the PUF and the challenge, e.g. multiple scattering of waves in a disordered medium, leads to a random-looking output, or response, for each separate challenge. The complex small-scale structure of the PUF makes it hard to produce a physical copy, while the complexity of the physical interactions defies computer modeling.
For example, a so-called optical PUF could comprise an optical medium containing many randomly distributed scatterers. A challenge could be an incident beam, and the response is then the consequent speckle pattern detected on a detector. The pattern of bright and dark spots can be converted to a bit string.
A problem with all physical tokens, in contrast to digital tokens, is that the responses are susceptible to noise and perturbations, causing differences between the enrolment phase and the authentication phase. The measurement noise can have many causes, e.g. token/detector misalignment, or environmental effects like temperature, moisture and vibrations. Due to the noise, the bit string that is extracted from a response may contain errors.
Most cryptographic protocols require that the bit string obtained during the authentication phase is exactly equal to the one obtained during the enrolment phase. For example, if the bit string is used as an encryption key, one bit flip in the key will yield an unrecognizable, useless result.
Several methods of calibration are known in the art to at least partially remedy the issues described above.
In one method, the alignment is to be guaranteed by mounting the physical token in a very rigid construction with passive positioning means like a notch or a spring-driven ball and hole. The construction is relatively heavy and big.
Another method, for optical PUFs only, is described in the non-prepublished patent application 04104035 (PHNL040912EPP). The optical PUF is put into a “reader” where challenges may be applied to it in order to verify its identity. For this, the angle of incidence of a probing laser beam must be set within an accuracy to a predetermined angle of incidence, to reproducibly obtain the same output to a given input. In addition, there is a need for a certain accuracy for the exact position of the PUF in the reader. The better the actual position and orientation of the PUF meets the predetermined values, the less the probability that the PUF will be identified wrongly due to a deviant speckle pattern. The method relies on the token having an alignment area with a predetermined spatial structure that is capable of producing at least three separate beams in response to an incident beam. A drawback of this method is that it requires the additional step of creating the alignment area in manufacturing identifiers with a PUF. Another drawback is that it only solves the problem of alignment, but other perturbations like a changing temperature may still cause a failure to authenticate a PUF. A further drawback is that the method is mostly suitable for optical PUFs only.
Another method is the use of error-correcting codes, capable of detecting and correcting a number of bit errors equal to a certain percentage of the total bit string length. However, the use of such a code puts a burden on the process of bit string extraction, growing with the number of errors that can be corrected. Another drawback of error-correcting codes is the fact that they do nothing to eliminate the noise source, i.e. they can extract only as much information as the signal-to-noise ratio allows.
Another method is the use of response reliability information, also known in the art as “helper data” or side information. In general, the response reliability information consists of extra information, stored together with corresponding challenge and response, by means of which the robustness of the bit string extraction process can be improved. For example, the response reliability information may consist of pointers to reliable portions of the response in its analog or digitized form, i.e. those portions that seem unlikely to be affected by noise. During authentication, the response reliability information is used to select certain portions of the physical output as ingredients for the bit string extraction process, or to give more weight to some portions than to others or to disregard non reliable portions.
A drawback of the method with helper data is that it does not eliminate the noise source, i.e. only as much information may be extracted as the signal-to-noise ratio allows.
Another drawback of the response reliability information method is that the assignment of the predicate “reliability” only reflects the enrolment phase. At that moment, the properties of the noise that will occur during authentication are not known. In many applications, the response data is obtained on a different testing station during enrolment than during authentication. Each testing station has its own particular perturbations and misalignments. Furthermore, in many applications of tokens, such as smart cards, there is a multitude of testing stations to choose from during authentication, so that it is impossible to anticipate the characteristics of a testing station that the user is going to use. Finally, also the environmental effects as mentioned above give rise to noise, and therefore the reliability of the data can change from one measurement to the next even on the same testing station.
Hence, there is still a substantial probability that bits which are labeled as reliable during enrolment actually get flipped during authentication, resulting in a failure to authenticate the physical token, or in a failure to generate a common shared secret between the two parties.
Further, the number of stored challenge response pairs collected during enrolment is limited, The pairs may therefore be considered a scarce resource, particularly because a challenge response pair is only to be used once for proper authentication, to avoid replay attacks.
It is therefore an object of the invention to provide a method of calibrating a device for authenticating a physical token that is less sensitive to perturbations like misalignment, device specific distortions or errors, environmental changes and so on.
To address the above issues and according to the invention, the object is achieved by a method as claimed in claim 1. By calibrating the device for authenticating the physical token with a challenge-response pair, many perturbing factors are taken into account, resulting in a relatively low sensitivity for perturbations. An additional advantage is that a single challenge response pair may be used many times over for calibrating, such that the risk of exhausting the pairs stored during enrolment is mitigated.
The device may be a conventional device for probing the physical token and receiving a response from the physical token. The device may alternatively be adapted for the invention.
The device may just be a relatively ‘dumb’ reader, and depend on a remote verifier for the actual computations for the response, the matching and the signaling. The device may however also comprise a verifier and have the authentication challenge-response pairs that are used for authenticating, stored in a local memory. The device may further also play a role during enrolment in storing the pairs in the memory.
The physical token may be a conventional physical token, but alternatively it may be adapted for the invention, e.g. by having a memory for storing calibration data. The physical token provides a response when probed with a challenge. It may be necessary to couple the physical token to the device in advance of the probing and the responding, but alternatively, the device and the physical token may be integrated into a single component.
The calibration challenge may be dedicated for calibrating and e.g. read from an identifier comprising the physical token, but also a conventional challenge may be used. The calibration challenge may be provided to the device by a verifier, but the calibration challenge may also be stored in the device or along with the physical token.
As known in the art, the response and the response retrieved may, prior to the matching, be subject to a further processing step, like a normalization step, a conversion into a bit string, a Gabor transform, applying helper data and so on. The matching may be performed twice, e.g. at a first and a second resolution, to determine a degree of perturbation.
Signaling that the device is calibrated in case of a match may e.g. be achieved by the device transmitting a signal to a remote verifier, or by the device requesting an end-user to re-insert the physical token or an identifier comprising the physical token.
The calibration result may have a nominal scale, an ordinal scale, a relative scale, an absolute scale, or a still other scale. The nominal scale may for example have two values: “ok” in case of a match and “not ok” in case of no match. More information is obtained from the calibrating if the scale is more enhanced, such that a following attempt to calibrate the device has higher probability to result in a match.
The invention is based on the insight that a challenge response pair may be used for calibrating the device. Because the response of the physical token correlates to the challenge in a way that is extremely complex and very hard to clone, it is counter-intuitive to use the pair for calibrating, and it is surprising that calibrating the device may be achieved.
In an advantageous embodiment, the method has the features of claim 2. By repeating the steps of claim 1 with the parameter modified, the chances of a successful calibration increase. The parameter may pertain to the calibration challenge, for example a position, a tilt, an angle, a wavelength, a spot size, and so on, or it may pertain to an environment setting like a temperature, a humidity, a pressure, a stress and so on. The parameter influences the calibrating by affecting the probabilities of a match. The parameter may be derived from the calibration challenge.
In an advantageous embodiment, the method has the features of claim 3. By setting the parameter to the target value derived from the calibrating, the probability for a successful calibration may be further increased. The parameter may additionally be partially derived from the calibration challenge. If the calibration is repeated several times, the target may be set in dependence of a history of the calibration results and optionally the calibration challenges. This may provide for a faster convergence, such that less repetitions are required before achieving calibration. The target may be a difference with respect to the current setting or challenge. This has the advantage that an offset error may be substantially reduced with a single repetition.
In an advantageous embodiment, the method has the features of claim 4. This may still further increase the probability of a successful calibration. Particularly, speckle patterns change gradually if the perturbations are within a confined range. E.g. a spatial offset may therefore be derived from the correlating.
In an advantageous embodiment, the method has the features of claim 5. The plurality may be thought of as a map of responses. By selecting the closest match, the current position on the map is determined. The current position is caused by the perturbations and deviations from the target position during enrolment that is also marked on the map. The map thus provides for determining an offset or a path from the current position to the target position, where calibration will likely be succesful. The comparing may comprise calculating a measure or the magnitude of an error.
In an advantageous embodiment, the method has the features of claim 6. Because the calibration challenge response pair used for calibrating need not be kept secret, the pair may be conveniently stored along with the physical token. If, for example, the physical token is embedded in a smart card with a memory, the reader may be equipped to retrieve the pair from the memory. The pair may have been stored in the memory at enrolment. Also, the card may carry an identification such that the device may distinguish cards based on determining the identification of the card. The device may then retrieve the pair based on the identification determined.
In an advantageous embodiment, the method has the features of claim 7. Particularly modifying a resolution may serve to speed up the calibration, because fewer repetitions may be required if the calibration starts with a coarse resolution and if the resolution is subsequently refined with the repetitions. Modifying the resolution may also improve the accuracy of the calibrating. This offers the advantage that the challenge density may be increased, leding to more available challenges from the same physical token. For optical PUF's, modifying the spot size of an incident beam provides for a convenient way to modify the resolution.
In an advantageous embodiment, the method has the features of claim 8. Because the calibration challenge used for calibrating is different from the authentication challenge used for authenticating, a small risk of a perturbation remains due to the fact that the device has to move from its calibration challenge settings to the authentication challenge settings. By selecting a calibration challenge for calibrating that is close to the challenge for authenticating, the remaining risk of a perturbation is further reduced.
The method of calibrating allows for a method of authenticating according to claim 8, where no challenge response pairs are wasted on attempting to authenticate an e.g. misaligned physical token, by comprising the calibrating according to claim 1, and by only attempting the authentication if signaling that the device is calibrated.
The method of calibrating may be used in a method of enabling calibrating the device for authenticating a physical token according to claim 10, where the calibrating is enabled, typically during enrolment, by storing a calibration challenge generated and a response obtained for retrieval for the calibrating. It is noted that also conventional pairs may be used for the invention, but that the conventional enrolment typically stores the pairs in a secret and tamper-proof memory, which is not required for the pairs for calibrating. Particularly, the pairs for calibrating may be stored in the plain and open, e.g. in a memory of a smart card embedding the physical token, or in a publicly accessible database, such that each device may use it as required. The enabling may be repeated, yielding the plurality of pairs of claim 9. The enabling may also be repeated with a parameter modified, possibly similar to claim 2, to obtain the plurality of responses of claim 5.
The method of claim 1 may be executed by, inter alia, an apparatus, a device, a verifier, or a system in accordance with the invention. Because the functionality in accordance with the invention may be implemented at either of these entities or be distributed over these entities, advantageous embodiments of the apparatus, the device, the verifier, the system, and the token according to the present invention substantially correspond to the embodiments of the method and have the same advantages for the same reasons.
Further, the invention also relates to a computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to the present invention.
These and other aspects of the invention will be apparent from and elucidated with reference to the illustrative embodiments shown in the drawings, in which:
Throughout the figures, same reference numerals indicate similar or corresponding features. Some of the features indicated in the drawings are typically implemented in software, and as such represent software entities, such as software modules or objects.
The invention relates to authentication methods 100 and protocols in which an identifier with a Physical Uncloneable Function (PUF) 102 is used, see
The owner of a PUF authenticates himself by producing the correct response to an authentication challenge, see
The use of ‘Physically Unclonable Functions’ (PUFs) for security purposes is a known concept. Incorporating a PUF into an identifier such as a smartcard, chip, storage medium etc. makes it extremely difficult to produce a ‘clone’ of the identifier. ‘Clone’ means either a physical copy of the identifier that includes the physical token, or a model that is capable of predicting the output behaviour of the identifier with a certain reliability. The difficulty of physical copying arises because manufacturing the PUF is an uncontrolled process and the PUF is a highly complex object. Accurate modelling is hard because of the PUF's complexity; slightly varying the input results in widely diverging outputs.
The uniqueness and complexity of PUFs make them well suited for identication or authentication purposes. Usage of PUFs typically includes:
The authentication protocol relies on the uniqueness of the CRPs. The response of the identifier is checked against the PUF response stored by the verifier during the enrollment. If the responses match, the verifier is convinced of the device's identity.
A PUF is called ‘strong’ if it yields unique, unpredictable responses to many different challenges.
Known types of PUF include:
Shining a laser through it produces a speckle pattern which strongly depends on the properties of the incoming wave front, see R. Pappu, PhD thesis, MIT 2001, Physical One-Way Functions, R. Pappu et al., Science Vol. 297, Sept 2002, p.2026, Physical One-Way Functions, and S. Feng at al., Phys. Rev. Lett. Vol.61, Nr.7, p.834 (1988), Correlations and Fluctuations of Coherent Wave Transmission through Disordered Media. The input can be varied by shifting or tilting the laser beam. Alternatively, it was described in R. Pappu, PhD thesis, MIT 2001, Physical One-Way Functions, how the wave front is changed by selecting pixels' out of the beam by means of selective blocking, e.g. with micromirrors (DMDs) or a liquid crystal.
A ‘strong’ PUF supports many CRPs. Its output depends on the incoming challenge so strongly that it becomes especially important to make sure that the correct challenge is fed to the PUF. If the laser beam is e.g. shifted or tilted too much with respect to the ‘ideal’ geometry that was used during the enrollment phase, an incorrect response is produced by the PUF, even if there is nothing wrong with the PUF. The same problem arises if e.g. the wavelength of the laser differs from the wavelength used during enrollment.
A challenge essentially consists of a description of the “settings” 111 that were used during a CRP measurement during the enrollment phase. Ideally, this description should be sufficient to ensure correct positioning of the PUF 102 and the reader 101 in the authentication phase. However, in reality there are many disturbances that can cause incorrect alignment, e.g. deformation of the identifier in which the PUF is embedded, wear and tear of the reader, small differences between readers, etc. In addition, the wavelength may vary, e.g. due to fluctuations in laser temperature and current or because of spread inherent to the lasers.
These disturbances can be either random or systematic. If a disturbance occurs randomly, there is a reasonable probability that repetition of the measurement will yield the correct response.
A problem is how to find a calibration mechanism compensating for substantially all disturbances, so that the settings during authentication are near to perfect.
Consequences of the calibration problem include some ensuing problems.
It is noted that a CRP should never be used for authentication more than once. If the verifier uses a challenge more than once and an eavesdropper was active the first time that particular challenge was sent, it is possible that the eavesdropper has learned the correct response and hence can impersonate the PUF the second time.
We also remark that, as storage of speckle patterns requires a significant amount of space, the verifier stores only a limited set of CRPs during enrollment. CRPs may be refreshed at a later stage, e.g. after a successful authentication by the identifier.
Calibration errors lead to an increased rate of failure of the authentication protocol. When the protocol is started again, a new CRP has to be used.
This means that calibration errors lead to quicker exhaustion of the set of stored CRPs in the verifier's database.
Summarising, perturbations like alignment and wavelength mismatches can give the following problems:
The concept of using “helper data” is known. During enrollment, some general properties (helper data) of each response are stored together with that response. During the authentication protocol, this helper data is sent along with the challenge in order to aid the measurement process. This method has the following properties:
In accordance with the invention, special calibration data 104, 108 is created during enrollment 301, which data 104, 108 are later used 100, 201 to reproduce the settings 111, e.g. align the measurement device 101 before an authentication challenge is provided.
During enrollment 301, see
Just prior to authentication 202-205, or during the authentication protocol, the following calibration steps take place:
If a measure of robustness is included in the calibration data 104, 108, the reader 101 searches 110 for features in decreasing order of robustness. If response features of non-ideal settings 111 are included, the reader 101 can use this data to determine 113 in which direction it needs to make adjustments 114, 115 in order to achieve perfect settings 111.
It is noted that differences between the invention and the helper data method include:
In one embodiment, the verifier stores 301 calibration data 104, 108. As indicated in
In another embodiment, we may have to accept that not all readers can perfectly control e.g. their laser wavelength and will not be able to achieve the nominal wavelength. In this case multiple versions of all CRPs may be stored 303 in a memory 122, e.g. a separate version for each wavelength interval in a set of wavelength intervals.
An identifier may thus contain a PUF 102, where the PUF is subjected to measurements 103, 105 during an enrollment phase, and calibration data are stored during the enrollment phase.
The identifier may comprise a memory 122, where the calibration data is stored 303.
The calibration data 104, 108 may be stored in a database 122 of the verifier.
The calibration data may be partly stored on the identifier and partly in a database of the verifier. Alternatively, the calibration data may be stored, partially or as a whole, in a third party database, that may be available to the public.
The invention leads to the following protocols:
A protocol in which a measurement result 106 is compared 107 to calibration data 108.
A protocol in which the alignment of the measuring device 101 relative to the identifier is adjusted 110 such that a measurement lies close to an authentication challenge.
A protocol in which the verifier 601 sends a calibration challenge 104.
A protocol in which the verifier sends partial information about the response 106 to a calibration challenge 104.
A protocol in which the verifier 601 chooses a calibration challenge 104 that resembles the authentication challenge, see
As shown in
During the part of the enrollment phase dealing with authentication, the PUF 102 is subjected to a set of authentication challenges Ci, with i=1,2, . . . N. During this process the correct alignment parameters 111 are used. The PUF's response to a challenge Ci is an analog output ai. The analog output ai is converted to a digital bit-string. Further digital processing (e.g. error correction and/or cryptographic operations) yields a bit-string Ki. The Verifier stores the set {Ci, Ki}, i=1, . . . , N for authentication purposes.
During the part of the enrollment phase dealing with calibration 301, the PUF 102 is subjected to a set of calibration challenges 104 Cjcal, j=1, . . . , M. For each challenge 104 Cjcal, different alignment parameters 111 Sk, k=1, . . . , P are applied and the analog PUF responses acal(j, k) are measured, which depend on the challenge 104 as well as the alignment parameters 111. The analog output acal (j, k) is converted to a digital bit-string 106. Further digital processing (e.g. error correction and/or cryptographic operations) 105 yields a bit-string Kcal(j, k). The set 118 {Cjcal, Kcal(j, k)}, j=1, . . . , M, k=1, . . . , P, called “calibration data”, is stored for calibration purposes. The calibration data can be stored anywhere. One example is a database kept by the Verifier. Another example is a data carrier attached to the PUF. Yet another example is a publicly accessible online database.
The device 101 acquires a calibration challenge Cjcal 104 from the set of calibration data. The device applies alignment parameters 111 that are best to its knowledge. The device 101 challenges 103 the PUF 102 with Cjcal 104. The PUF's analog output a′cal(j) is converted 105 to a digital bit-string. Further digital processing 105 (e.g. error correction and/or cryptographic operations) yields a bit-string K′cal(j). The device 101 accesses, from the calibration data, the responses 108 {Kcal(j,k)}, which pertain to calibration challenge Cjcal. The device 101 compares 107, 117 the bit-string K′cal(j) to the bit-strings Kcal(j,k). Based on this comparison, the device estimates 119, 120 the difference Δ between the correct alignment parameters and the current alignment parameters. If the difference Δ is larger than a pre-determined threshold value, then the device adjusts 110 its alignment parameters 111 by an amount Δ 114 and repeats 112 the previous steps. If the difference Δ is not larger than the pre-determined threshold value, then the device sends 109 a message to the Verifier, initiating the second step 202-205 of the protocol.
The Verifier selects an authentication challenge Ci from his database and sends it to the device. The device 101 subjects 202 the PUF 102 to the authentication challenge Ci. The analog response a′i is measured 203 and converted 203 to a digital bit-string. Further processing 203 of this bit-string (possibly depending on further input from the Verifier) yields a response string. In particular, this response string could comprise an encryption of a random number received from the Verifier. The device sends the response string to the Verifier. The Verifier accesses the bit-string Ki from his database and processes 204 the response string in combination with Ki. (In particular, this processing step could comprise encrypting a random number with Ki and comparing the result to the response string). Based on this processing step 204, the Verifier decides 205 if the PUF 102 is authentic or not.
The device 101 acquires 121 a calibration challenge Cjcal 104 from the set of calibration data 104, 108. The device 101 applies alignment parameters 111 that are best to its knowledge. The device challenges 103 the PUF with Cjcal 104. The device converts 105 the PUF's analog output a′cal(j) to a digital bit-string. Further digital processing (e.g. error correction and/or cryptographic operations) yields a bit-string K′cal(j). The device sends K′cal(j) to the Verifier. The Verifier accesses, from the calibration data, the responses {Kcal(j,k)}, which pertain to calibration challenge Cjcal. The Verifier compares 107 the bit-string K′cal(j) 106 to the bit-strings Kcal(j,k) 108. Based on this comparison, the Verifier estimates the difference Δ 114 between the correct alignment parameters and the current alignment parameters 111. If the difference A is larger than a pre-determined threshold value, then the Verifier sends Δ to the device. The device 101 then adjusts 110 its alignment parameters 111 by an amount Δ 114 and repeats 112 the previous steps. If the difference Δ is not larger than the pre-determined threshold value, then the Verifier commences the second step 202-205 of the protocol.
The Verifier selects an authentication challenge Ci from his database and sends it to the device 101. The device subjects 202 the PUF 102 to the challenge Ci. The analog response a′i is measured 203 and converted 203 to a digital bit-string. Further processing of this bit-string (possibly depending on further input from the Verifier) yields a response string 106. In particular, this response string could comprise an encryption of a random number received from the Verifier. The device sends the response string to the Verifier. The Verifier accesses the bit-string Ki from his database and processes 204 the response string in combination with Ki. (In particular, this processing step could comprise encrypting a random number with Ki and comparing the result to the response string). Based on this processing step 204, the Verifier decides 205 if the PUF 102 is authentic or not.
The step of correlating 116 a newly obtained PUF 102 response 106 to stored calibration data 108 can be implemented in many ways. The stored calibration data can correspond to any of the processing stages between the analog PUF output and the final, error-corrected bit-string.
In one example, an A/D converted version of the analog output is directly used. In the case of an optical PUF, this A/D conversion yields a 2D bitmap image, and a correlation between two bitmaps is computed using well-known image processing techniques such as Fourier transforms and inner products. For PUFs in general, the A/D conversion yields a bit-string, and a correlation between two bit-strings is computed using standard concepts such as Hamming Distance and Edit Distance.
In another example, processing such as filtering or error correction is applied to the A/D converted output before correlation takes place. Again, possible ways of computing a correlation between responses involve 2D image correlation, Hamming Distance and Edit Distance.
In yet another example, a cryptographic key is derived from the PUF response before correlation takes place. In this case, Hamming Distance and Edit Distance provide a measure of correlation between two keys.
In a further example, an encrypted value is derived from the PUF response before correlation takes place. In this case, only a “binary” measure of correlation exists between two encrypted values, namely equality vs. non-equality of bit-strings.
In a typical use of the method, the authentication takes place with the physical token at a device, but the previous enrolment took place at a further device. Concatenating all the steps for such a scenario, the use may be summed up as: a method for authenticating a physical token at a device using an authentication challenge, with the steps:
The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the device claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Number | Date | Country | Kind |
---|---|---|---|
05100726.8 | Feb 2005 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB06/50258 | 1/24/2006 | WO | 00 | 7/30/2007 |