-
公开(公告)号:US20220116206A1
公开(公告)日:2022-04-14
申请号:US17558627
申请日:2021-12-22
Applicant: Intel Corporation
Inventor: David KEHLET , Shuanghong SUN , Saikumar JAYARAMAN , Fariaz KARIM
Abstract: A first semiconductor device includes a processor configured to generate a random number at initial test of a second semiconductor device after fabrication of the second semiconductor device in a supply chain related to the second semiconductor device, and send the generated random number to the second semiconductor device. The processor is further configured to receive a first signature that is signed over the sent random number by the second semiconductor device using a first private key that is stored in the second semiconductor device, among a first private and public key pair, and test the received first signature, using a first public key that is stored in the first semiconductor device, among the first private and public key pair, to determine whether the second semiconductor device is authenticated.
-
2.
公开(公告)号:US20240054502A1
公开(公告)日:2024-02-15
申请号:US17883718
申请日:2022-08-09
Applicant: Intel Corporation
Inventor: Michael A. SCHROEDER , Sean BUSHELL , William F. HERRINGTON , Hannah ROWE , Sarah SHAHRAINI , Ryan PATE , Erasenthiran POONJOLAI , Saikumar JAYARAMAN , Fariaz KARIM
CPC classification number: G06Q30/018 , G06V20/95 , G06V20/80 , G06V10/14 , H04L9/3236
Abstract: The present disclosure is directed to an authentication system, tools, and methods for authentication including a first inspection tool that generates first images for a first inspection of a device, and a first processor for processing the first images using a hashing algorithm, for which the first inspection tool and the first processor are sited at a first location, and a second inspection tool that generates second images for a second inspection of the device, and a second processor for processing the second images using the hashing algorithm, for which the second inspection tool and the second processor are sited at a second location. The second processor compares the first and second sets of hash values to authenticate the device as being authentic and untampered.
-