There are increasing concerns about semiconductor security and counterfeiting in the global marketplace and cybersecurity strategies must address and prevent hardware systems from being compromised by counterfeit components. The introduction of counterfeit or compromised parts can have a serious impact on national security, and public health and safety when these parts do not perform as intended or otherwise fail or malfunction, and there have been reported cases of counterfeit semiconductor devices infiltrating critical applications in the military and medical sectors.
To counter this growing threat and prevent counterfeits from adversely affecting the performance and reliability of critical systems, the semiconductor industry, governments, and the defense industry are working to address weaknesses in the supply chain and to promote the adoption of aggressive counterfeit avoidance practices. However, counterfeit semiconductor chips and electronic parts may be difficult to identify if they are functionally equivalent to the genuine parts but have additional undesired features that facilitate the release of sensitive data to hostile interests or cause untimely failures. The security measures need to begin with the manufacturers and continue through the supply chain to a final authentication by the end consumer. Ideally, the adopted security measures need to be impossible to defeat and their utilization needs to be difficult to detect by casual observers, as well as by resource-rich, dedicated counterfeiting entities. The authentication and anti-counterfeiting measures must employ non-destructive methods/tests and be automatable. Any weaknesses in the testing regime for counterfeit semiconductor devices and/or electronic parts may create vulnerabilities that could be exploited by counterfeiters.
In the drawings, like reference characters generally refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the present disclosure. The dimensions of the various features or elements may be arbitrarily expanded or reduced for clarity. In the following description, various aspects of the present disclosure are described with reference to the following drawings, in which:
The following detailed description refers to the accompanying drawings that show, by way of illustration, specific details, and aspects in which the present disclosure may be practiced. These aspects are described in sufficient detail to enable those skilled in the art to practice the present disclosure. Various aspects are provided for devices, and various aspects are provided for methods. It will be understood that the basic properties of the devices also hold for the methods and vice versa. Other aspects may be utilized and structural, as well as logical changes, may be made without departing from the scope of the present disclosure. The various aspects are not necessarily mutually exclusive, as some aspects can be combined with one or more other aspects to form new aspects.
In an aspect, the present disclosure is directed to a comprehensive physical security methodology that uses key metrologies and inspection tools (e.g., a laser marking tool, an x-ray inspection tool, etc.) to capture images of unit-specific variations (e.g., laser mark patterns) or non-critical defects (e.g., thermal interface material (TIM) voiding, solder bleed out, etc.) as fingerprints or “first images” for products, such as semiconductor devices. In an aspect, these images or fingerprints may then be converted to a digital hash (i.e., hash values) or other secure values that is associated with the product or device. As the semiconductor device, for example, moves from a manufacturer to intermediaries in a supply chain and ultimately to customers, the intermediaries and/or customer may use the same key metrologies and tools to recapture the images that were first taken by the manufacturer, and these recaptured or “second images” may be hashed again using the same hashing algorithms and both set of hash values may be compared to ensure the component is authentic, which can be shown by substantially overlapping hash values.
In another aspect, the present disclosure is directed to an authentication tool, including one or more imaging units for generating images of selected physical features of a device, such as a semiconductor device, positioned on a stage, and a processor coupled to the one or more imaging units and configured to perform a cryptographic hash function. In an aspect, the processor converts the generated images for the device into hash values using a hashing application, and the hash values are associated with the device and provided to intermediaries and customers to perform authentication testing using their own authentication tool and processor. In this aspect, the authentication tool may include an x-ray imaging unit or an optical imaging unit, or a combination of both units as a single authentication tool.
In another aspect, the present disclosure is directed to a method including conducting a first inspection of a device and converting the data from the first inspection to a first set of secure values, and conducting a second inspection of the device and converting the data from the second inspection to a second set of secure values and comparing the first set of secure values with the second set of secure values, for which a substantial overlapping of the first and second sets of secure values shows the device is authentic and untampered.
In another aspect, the present disclosure is directed to an authentication system having a first inspection tool that generates first images for a first inspection of a device and a first processor for processing the first images using a hashing algorithm, for which the first inspection tool and the first processor are sited at a first location and a second inspection tool that generates second images for a second inspection of the device and a second processor for processing the second images using the same hashing algorithm, for which the second inspection tool and the second processor are sited at a second location. In addition, the authentication system has first and second inspection tools that are configured to be copy exact using information provided by a manufacturer of the device.
In another aspect, the key metrologies, inspection tools, processors, and other systems used by intermediaries/customers for authentication may employ a “copy exact” methodology that matches, for example, the equipment, processes and procedures, recipes, etc., at all levels for physical inputs and statistically-matched responses (i.e., outputs) used by the manufacturer to produce the device/product and for inspection and authentication testing. The physical inputs, such as equipment configuration, chemical purity, facilities, equipment hookups, and other inputs, may also use this methodology. The use of a copy exact methodology may allow a first set of hash values obtained by the manufacturer for the device and a second set of hash values obtained by intermediaries/customers for the device to be near identical or substantially overlapping for their authentication testing.
The technical advantages of the present disclosure may include, but are not limited to:
According to the present disclosure, the authentication method may provide unique sets of hash values that become associated with and accompany a device. As well understood, hashing may be defined by two distinct characteristics—irreversibility and uniqueness. It is irreversible because hash values cannot be easily “de-hashed”, and it is unique because no two hash values are ever the same for two different pieces of data when using a validated hashing algorithm. For example, ORB similarity, perceptual, and difference image hashing are families of algorithms that may generate content-based image hashes in the present disclosure.
In addition, hash values are highly convenient for comparing files or databases. In an aspect, rather than comparing the present inspection image data in its original form, it is much easier for processors/computers to compare their hash values. A hash algorithm has a mathematical function that converts an input value into a compressed numerical value—a hash or hash value. The processor takes the image data of an arbitrary length and provides an output of a fixed length—the hash value. The size of the data blocks may differ from one algorithm to another but for a particular algorithm, it remains the same.
To more readily understand and put into practical effect the present authentication tools and system, and the methods for a device product and/or semiconductor device authentication, particular aspects will now be described by way of examples provided in the drawings that are not intended as limitations. The advantages and features of the aspects herein disclosed will be apparent through reference to the following descriptions relating to the accompanying drawings. Furthermore, it is to be understood that the features of the various aspects described herein are not mutually exclusive and can exist in various combinations and permutations. For the sake of brevity, duplicate descriptions of features and properties may be omitted.
Further to the aspect shown in
In an aspect, the inspection tool 101b, as well as the process used to generate the two images 102b and 103b, and the processor 104b at the intermediary's or customer's site may be, respectively, copy exact versions of the inspection tool 101a, the process used to generate the two images 102a and 103a, and the processor 104a. In addition, it is within the scope of the present disclosure to have an inspection tool include a plurality of imaging units and a processor as a single authentication tool, which may further include data storage as part of the authentication tool. In an aspect, an imaging unit may include x-ray devices, optical cameras, infrared cameras, LIDAR, and other imaging devices. In another addition, it is within the scope of the present disclosure to have a processor use an imaging algorithm that provides secure and compressed data values in place of the cryptographic hash function. In another aspect, a processor may include a CPU, a microprocessor, a digital signal processor, a computer, a server and other devices providing logic circuitry.
In addition, it is within the scope of the present disclosure to have an x-ray inspection tool included among a plurality of imaging units combined with a processor as a single authentication tool, which may further include data storage as part of the authentication tool used by the manufacturer and/or customer. In another aspect, a manufacturer may use an existing x-ray inspection tool (i.e., used for plan of record processes) to obtain and retain data that may be needed for the present authentication methodology.
It should be understood that mark 411 is provided as an example, and a designated security mark may take a variety of forms on the semiconductor package 407, including being near invisible under ordinary human visual inspection, for the purpose of authentication. In addition, while not shown, it is within the scope of the present disclosure to have the mark 411 be placed at other locations (e.g., a package substrate for a lidless or naked chip package).
In addition, it is within the scope of the present disclosure to have a digital visual inspection tool included among a plurality of imaging units combined with a processor as a single authentication tool, which may further include data storage as part of the authentication tool used by the manufacturer and/or customer. In another aspect, a manufacturer may use an existing digital visual inspection tool (i.e., used for plan of record processes) to obtain and retain data that may be needed for the present authentication methodology or inspection protocol.
In addition, it is within the scope of the present disclosure to have both an x-ray inspection tool and a digital visual inspection tool included among a plurality of imaging units combined with a processor as a single authentication tool, which may further include a data storage as part of the authentication tool used by the manufacturer and/or customer. In another aspect, a manufacturer may use existing x-ray inspection tools and digital visual inspection tools (i.e., used for plan of record processes) to obtain and retain data that may be needed for the present authentication methodology. It is also within the scope of the present disclosure to have the present authentication system, tools and methodology be automated (e.g., using conveyors or handlers for positioning trays of semiconductor devices onto a tool's stage) similar to existing inspection systems and tools.
In accordance with the present disclosure,
The operation 1001 may be directed to obtaining one or more first digital fingerprints of a product using a first set of tools.
The operation 1002 may be directed to converting the first digital fingerprints of the product using a hashing algorithm to first hash values.
The operation 1003 may be directed to delivering the product to an intermediary or end customer, along with providing availability to the first hash values associated with the product.
The operation 1004 may be directed to obtaining one or more second digital fingerprints of a product using a second set of tools that are copy exact with the first set of tools.
The operation 1005 may be directed to converting the second digital fingerprints of the product using the same hashing algorithm to second hash values and comparing the second hash values with the first hash values.
In accordance with the present disclosure, for example, for lidded semiconductor products using a solder thermal interface (TIM), the semiconductor products may be scanned through an x-ray inspection tool, as part of a normal process flow. A solder TIM leaves unique voiding signatures and an x-ray image may be captured as a security fingerprint. In addition, lidded products are typically marked with a manufacturer's logos and identifiers at the laser mark module, as part of a normal process flow. A post-final package assembly will have the product pass through one or more inspection modules, where a visual inspection tool may be used to check a variety of metrics for quality, and at this point, a digital visual image of the laser-marked lid may be captured as another security fingerprint. The semiconductor products may be shipped to intermediaries and/or customers, with unique x-ray and inspection (laser mark) images securely sent or made available as a first set of hash values to such intermediaries and/or customers for each unit. An algorithm for image hashing (e.g., perpetual and/or difference hash) generates unique hash values for the laser mark inspection and x-ray images. The intermediaries and/or customers may use the x-ray and inspection metrologies provided by the manufacturer to capture additional images of the units and create a second set of hash values. The images, as hash values, for each unit taken pre-shipping (by the manufacturer) and post-shipping (by the intermediary or customer) are compared, and failing products are removed.
In an aspect, the hashing algorithms may provide a high level of confidence based on the hamming distance results in identifying and differentiating between images taken of the same unit on different tools versus non-similar units. It is within the scope of the present disclosure to use other algorithms capable of converting images to “secure values”, which are unique, allow for differentiation between images, and can be stored and securely transmitted between a manufacturer and its intermediaries and customers. The present authentication methodology may ensure that a unit is genuine and has not been tampered with.
It will be understood that any specific property described herein for a particular aspect of an authentication system, authentication tool, and method may also generally hold for any of the other aspects thereof described herein. It will also be understood that any specific property described herein for a specific method may generally hold for any of the other methods described herein. Furthermore, it will be understood that for any tool, system, or method described herein, not necessarily all the components or operations described will be enclosed in the tool, system, or method, but only some (but not all) components or operations may be enclosed.
To more readily understand and put into practical effect the present reticle assemblies and sensor assemblies, they will now be described by way of examples. For the sake of brevity, duplicate descriptions of features and properties may be omitted.
Example 1 provides an authentication tool including one or more imaging units for generating images of selected physical features of a device (e.g., semiconductor device) positioned on a stage, and a processor coupled to the one or more imaging units and configured to perform a cryptographic hash function, for which the processor converts the generated images for the device into hash values and the hash values are associated with the device.
Example 2 may include the authentication tool of example 1 and/or any other example disclosed herein, for which the processor generates the hash values using a hashing application.
Example 3 may include the authentication tool of example 1 and/or any other example disclosed herein, for which the one or more imaging units further comprise an x-ray imaging unit and/or an optical imaging unit.
Example 4 may include the authentication tool of example 3 and/or any other example disclosed herein, for which the device includes a lid having a thermal interface material (TIM) with TIM voids under the lid, and for which the selected physical features for the devices being the TIM voids, and the generated images by the x-ray imaging unit comprise images of the TIM voids.
Example 5 may include the authentication tool of example 3 and/or any other example disclosed herein, for which the selected physical feature for the device being the laser etchings and the generated images by optical imaging unit includes images of the laser etchings.
Example 6 may include the authentication tool of example 1 and/or any other example disclosed herein, further including a data library for storing the hash values, for which the data library is accessible to one or more entities obtaining possession or control of the device.
Example 7 may include the authentication tool of example 1 and/or any other example disclosed herein, for which the device is provided with a manufacturer's hash values and further including the processor comparing the hash values for the device with the manufacturer's hash values provided with the device.
Example 8 may include the authentication tool of example 1 and/or any other example disclosed herein, for which the stage further includes a support for receiving a plurality of devices for an automated inspection.
Example 9 provides a method including conducting a first inspection of a device using an inspection protocol at a first site, generating data from the first inspection of the device, converting the data from the first inspection to a first set of secure values, for which the device is delivered to a second site and the first set of secure values is used for authenticating the device.
Example 10 may include the method of example 9 and/or any other example disclosed herein, further including conducting a second inspection of the device using the inspection protocol at a second site, generating data from the second inspection of the device, converting the data from the second inspection to a second set of secure values, and comparing the first set of secure values with the second set of secure values, for which comparing the first set of secure values with the second set of secure values shows a substantial overlapping of the first and second sets of secure values when the device is authentic and untampered.
Example 11 may include the method of example 9 and/or any other example disclosed herein, for which the first and second inspections are conducted using one or more inspection tools that are configured to be copy exact.
Example 12 may include the method of example 9 and/or any other example disclosed herein, for which the first inspection is conducted by a manufacturer of the device and the second inspection is conducted by one or more entities obtaining possession or control of the device.
Example 13 may include the method of example 11 and/or any other example disclosed herein, for which the first and second inspections comprise generating one or more images of selected physical features of the device using the inspection tools.
Example 14 may include the method of example 11 and/or any other example disclosed herein, for which the inspection tools comprise an x-ray imaging unit and/or an optical imaging unit.
Example 15 may include the method of example 12 and/or any other example disclosed herein, for which the comparing the first set of secure values with the second set of secure values is conducted by the one or more entities obtaining possession or control of the device.
Example 16 may include the method of example 12 and/or any other example disclosed herein, for which converting the data from the first and second inspections to the respective first and second sets of secure values include a first step of pre-processing the one or more images from the first and second inspections, respectively, and a second step of generating the first and second sets of secure values, respectively, using a hashing algorithm.
Example 17 provides an authentication system including a first inspection tool, for which the first inspection tool generates first images for a first inspection of a device, and a first processor for processing the first images using a hashing algorithm, for which the first inspection tool and the first processor are sited at a first location, and a second inspection tool, for which the second inspection tool generates second images for a second inspection of the device, and a second processor for processing the second images using the hashing algorithm, for which the second inspection tool and the second processor are sited at a second location.
Example 18 may include the authentication system of example 17 and/or any other example disclosed herein, for which the first inspection tools and second inspection tools are configured to be copy exact using information provided by a manufacturer of the device.
Example 19 may include the authentication system of example 17 and/or any other example disclosed herein, for which the processing of the first images using the hashing algorithm generates a first set of hash values and the processing of the second images using the hashing algorithm generates a second set of hash values, for which the hashing algorithm is executed with parameters provided by the device's manufacturer.
Example 20 may include the authentication system of example 19 and/or any other example disclosed herein, further including the second processor comparing the first and second sets of hash values to authenticate the device as being authentic and untampered.
The term “comprising” shall be understood to have a broad meaning similar to the term “including” and will be understood to imply the inclusion of a stated integer or operation or group of integers or operations but not the exclusion of any other integer or operation or group of integers or operations. This definition also applies to variations on the term “comprising” such as “comprise” and “comprises”.
The term “coupled” (or “connected”) herein may be understood as electrically coupled or as mechanically coupled, e.g., attached or fixed or attached, or just in contact without any fixation, and it will be understood that both direct coupling or indirect coupling (in other words: coupling without direct contact) may be provided.
The terms “and” and “or” herein may be understood to mean “and/or” as including either or both of two stated possibilities.
While the present disclosure has been particularly shown and described with reference to specific aspects, it should be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims. The scope of the present disclosure is thus indicated by the appended claims and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced.
This matter is subject to a contract with the U.S. Government. Pursuant to that contract, the following Government Interest Statement must be included in the Specification of the Patent Application as filed: This Invention was made with Government support under Agreement No. N00164-19-9-0001, awarded by NSWC Crane Division. The Government has certain rights in the Invention