17883718. METHODS AND TOOLS FOR PREVENTING THE COUNTERFEITING AND TAMPERING OF SEMICONDUCTOR DEVICES simplified abstract (Intel Corporation)
Contents
METHODS AND TOOLS FOR PREVENTING THE COUNTERFEITING AND TAMPERING OF SEMICONDUCTOR DEVICES
Organization Name
Inventor(s)
Michael A. Schroeder of Chandler AZ (US)
Sean Bushell of Peoria AZ (US)
William F. Herrington of Scottsdale AZ (US)
Hannah Rowe of Chandler AZ (US)
Sarah Shahraini of Newcastle WA (US)
Erasenthiran Poonjolai of Chandler AZ (US)
Saikumar Jayaraman of Chandler AZ (US)
Fariaz Karim of GILBERT AZ (US)
METHODS AND TOOLS FOR PREVENTING THE COUNTERFEITING AND TAMPERING OF SEMICONDUCTOR DEVICES - A simplified explanation of the abstract
This abstract first appeared for US patent application 17883718 titled 'METHODS AND TOOLS FOR PREVENTING THE COUNTERFEITING AND TAMPERING OF SEMICONDUCTOR DEVICES
Simplified Explanation
The patent application is for an authentication system that uses inspection tools and processors to verify the authenticity and integrity of a device by comparing sets of hash values generated from images taken during inspections at different locations.
- First inspection tool generates images for initial inspection
- First processor processes images using hashing algorithm
- Second inspection tool generates images for secondary inspection
- Second processor processes images using hashing algorithm
- Second processor compares hash values to authenticate device
Potential Applications
- Anti-counterfeiting measures for electronic devices
- Secure access control systems
- Supply chain management for verifying product authenticity
Problems Solved
- Preventing tampering and counterfeiting of devices
- Ensuring the integrity of electronic products
- Enhancing security measures for authentication processes
Benefits
- Increased security and trust in device authenticity
- Efficient and reliable authentication process
- Protection against counterfeit products and unauthorized modifications
Original Abstract Submitted
The present disclosure is directed to an authentication system, tools, and methods for authentication including a first inspection tool that generates first images for a first inspection of a device, and a first processor for processing the first images using a hashing algorithm, for which the first inspection tool and the first processor are sited at a first location, and a second inspection tool that generates second images for a second inspection of the device, and a second processor for processing the second images using the hashing algorithm, for which the second inspection tool and the second processor are sited at a second location. The second processor compares the first and second sets of hash values to authenticate the device as being authentic and untampered.
- Intel Corporation
- Michael A. Schroeder of Chandler AZ (US)
- Sean Bushell of Peoria AZ (US)
- William F. Herrington of Scottsdale AZ (US)
- Hannah Rowe of Chandler AZ (US)
- Sarah Shahraini of Newcastle WA (US)
- Ryan Pate of Gilbert AZ (US)
- Erasenthiran Poonjolai of Chandler AZ (US)
- Saikumar Jayaraman of Chandler AZ (US)
- Fariaz Karim of GILBERT AZ (US)
- G06Q30/00
- G06V20/00
- G06V20/80
- G06V10/14
- H04L9/32