18366602. Security Device Including Physical Unclonable Function Cells, Operation Method of Security Device, and Operation Method of Physical Unclonable Function Cell Device simplified abstract (Samsung Electronics Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

Security Device Including Physical Unclonable Function Cells, Operation Method of Security Device, and Operation Method of Physical Unclonable Function Cell Device

Organization Name

Samsung Electronics Co., Ltd.

Inventor(s)

Seungwon Lee of Yongin-si (KR)

Security Device Including Physical Unclonable Function Cells, Operation Method of Security Device, and Operation Method of Physical Unclonable Function Cell Device - A simplified explanation of the abstract

This abstract first appeared for US patent application 18366602 titled 'Security Device Including Physical Unclonable Function Cells, Operation Method of Security Device, and Operation Method of Physical Unclonable Function Cell Device

Simplified Explanation

The abstract describes a security device that utilizes a physical unclonable function (PUF) cell array to generate a security key for authentication requests. Here is a simplified explanation of the abstract:

  • The security device includes a PUF cell array with multiple PUF cells connected to a word line.
  • A controller selects a specific PUF cell and outputs a control signal based on that cell.
  • A decoder applies a voltage to the word line in response to the control signal.
  • A bit line selection circuit outputs a target current across the bit line connected to the selected PUF cell and a sum current across the remaining bit lines.
  • A bit determiner uses the target current and sum current to determine the target bit of the selected PUF cell.
  • The security device generates a security key based on the target bit to respond to authentication requests.

Potential applications of this technology:

  • Authentication systems: The security device can be used in various authentication systems, such as access control, secure communication, and identity verification.
  • Secure storage: The device can be used to generate security keys for encrypting and protecting stored data.
  • Anti-counterfeiting measures: The technology can be applied to create unique identifiers or tags that help prevent counterfeiting of products.

Problems solved by this technology:

  • Cloning prevention: The physical unclonable function (PUF) cells provide a unique and unclonable characteristic, making it difficult for attackers to replicate the security key.
  • Secure authentication: The device generates a security key based on the PUF cells, enhancing the security and reliability of authentication processes.
  • Robustness: The use of PUF cells adds an extra layer of security as they are resistant to various attacks, including physical tampering and reverse engineering.

Benefits of this technology:

  • Enhanced security: The unique characteristics of the PUF cells make it extremely difficult for attackers to clone or replicate the security key.
  • Reliable authentication: The security device generates a security key based on the PUF cells, ensuring a reliable and secure authentication process.
  • Robust against attacks: The PUF cells provide resistance against various attacks, making the security device more robust and secure.


Original Abstract Submitted

A security device includes a physical unclonable function (PUF) cell array that includes a plurality of PUF cells connected with a first word line, a controller that selects a target PUF cell of the plurality of PUF cells and outputs a control signal based on the target PUF cell, a decoder that applies a first voltage to the first word line in response to the control signal, a bit line selection circuit that outputs a target current across a bit line connected with the target PUF cell and a sum current corresponding to a sum of currents across the remaining bit lines connected with other PUF cells, and a bit determiner that outputs a target bit of the target PUF cell based on the target current and the sum current, and the security device generates a security key based on the target bit for responding to an authentication requests.