Patents by Inventor Geert Jan Schrijen
Geert Jan Schrijen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8699714Abstract: An electronic system (100) having a memory (1 12, 1 14, 1 16) with multiple memory locations, each specific memory location of the multiple memory locations being arranged to produce a respective value, the respective value depending on a physical, at least partially random, configuration of components constructing the specific memory location, the electronic system comprises a key extraction means (130) arranged to retrieve multiple values in a first order from the multiple memory locations and for determining a reproducible cryptographic key in dependency on the multiple values, characterized in that the electronic system further comprises a re-ordering (120) means in between the memory and the key extraction means for providing the multiple values to the key extraction means in a second order, different from the first order, prior to determining the cryptographic key.Type: GrantFiled: November 17, 2009Date of Patent: April 15, 2014Assignee: Intrinsic ID B.V.Inventors: Pim Theo Tuyls, Geert Jan Schrijen, Daniel Willem Elisabeth Schobben
-
Patent number: 8694856Abstract: Systems for generating an identifying response pattern comprising a memory (120) used as a physically unclonable function configured for generating a response pattern dependent on physical, at least partially random characteristics of said memory may be vulnerable to freezing attacks and to aging. A memory-overwriting device (110) configured for overwriting at least a first portion of the plurality of memory locations to obscure the response pattern in the memory avoids freezing attacks. An anti-degradation device (160) configured to write to each respective location of a second portion of the plurality of memory locations an inverse of a response previously read from the memory reduces the effects of aging.Type: GrantFiled: August 6, 2010Date of Patent: April 8, 2014Assignee: Intrinsic ID B.V.Inventors: Pim Theo Tuyls, Geert Jan Schrijen
-
Publication number: 20140040338Abstract: A random number generating system for generating a sequence of random numbers comprising a memory, the memory being writable, volatile and configured such that the memory contains an at least partially random memory content upon each powering-up of the memory, an instantiating unit configured for seeding the random number generating system with a seed dependent upon the at least partially random memory content, the sequence of random numbers being generated in dependence upon the seed, and an over-writing unit configured for over-writing at least part of the memory with random numbers generated by the random number generating system in dependence upon the seed.Type: ApplicationFiled: April 5, 2012Publication date: February 6, 2014Applicant: INTRINSIC ID B.V.Inventors: Erik Van Der Sluis, Geert Jan Schrijen, Helena Handschuh
-
Patent number: 8645694Abstract: There is provided an authentication method for a system (10) comprising several devices (30). The method involves: a) providing each device (30) with an identity value (pi: i=1, . . . , n) and a polynomial (P) for generating a polynomial key; (b) including a verifier device (p1) and a prover device (P2)amongst said devices (30); (c) arranging for the prover device (p2) to notify its existence to the verifier device (P1); (d) arranging for the verifier device (pi) to challenge the prover device (p2) to encrypt a nonce using the prover (P2)device's polynomial (P) key and communicate the encrypted nonce as a response to the verifier device (p1); (e) arranging for the verifier device (p1) to receive the encrypted nonce as a further challenge from the prover device (pZ) and: (i ) encrypt the challenge using the polynomial keys generated from a set of stored device identities; or (ii) decrypt the challenge received using the set of polynomial keys; until said verifier device (p1) identifies an authentication match.Type: GrantFiled: September 27, 2005Date of Patent: February 4, 2014Assignee: Koninklijke Philips N.V.Inventors: Geert Jan Schrijen, Thomas Andreas Maria Kevenaar
-
Patent number: 8502669Abstract: It is described a RFID device (231a, 231b, 231c, 331) comprising a data memory (236) and an electronic circuit arrangement (237, 238, 239, 247) coupled thereto. The electronic circuit arrangement has a first and a second operational configuration, wherein by receiving a control command (250a) the electronic circuit arrangement can be switched irreversibly from the first to the second configuration. The RFID device further comprises a communication interface (245) being coupled to the electronic circuit arrangement. In the first configuration the RFID device is adapted to communicate with a standard RFID reader (110) via the communication interface. In the second configuration the communication with the standard RFID reader is disabled and the RFID device is adapted to communicate with a readout-RFID device (370). The RFID device may be equipped with a secondary communication interface that can be used to communicate with the RFID device in a privacy-preserving manner.Type: GrantFiled: September 19, 2007Date of Patent: August 6, 2013Assignee: Koninklijke Philips N.V.Inventors: Jorge Guajardo Merchan, Geert Jan Schrijen, Claudine Viegas Conrado, Antoon Marie Henrie Tombeur, Pim Theo Tuyls
-
Publication number: 20130194886Abstract: An electric physical unclonable function (PUF) (100) is provided comprising a semiconductor memory element (110) connectable to a PUF control means for reading content from the memory element and for deriving at least in part from said content a digital identifier, such as a secret key. Upon powering the memory element it settles into one of at least two different stable states. The particular stable state into which the memory element settles is dependent at least in part upon random physical characteristics of the memory element introduced during manufacture of the memory element. Settling of the memory element is further dependent upon a control input (112) of the memory element.Type: ApplicationFiled: September 28, 2011Publication date: August 1, 2013Applicant: INTRINSIC ID B.V.Inventors: Geert Jan Schrijen, Petrus Wijnandus Simons, Erik Van Der Sluis, Pim Theo Tuyls
-
Patent number: 8412937Abstract: A method is presented for enabling authentication of a prover in a Radio Frequency Identification system comprising the prover and a verifier, the method comprising the steps of: the prover sending a prover identifier and a parent identifier to the verifier, the verifier sending a verifier identifier to the prover, the prover calculating a first common secret by means of a prover polynomial, where an unknown in the prover polynomial is substituted by a result calculated using a function of at least the verifier identifier, and the verifier calculating the first common secret by means of a first verifier polynomial, wherein a first unknown in the first verifier polynomial is substituted by the prover identifier and a second unknown in the first verifier polynomial is substituted by the parent identifier, the prover creating a first message by modulating a first core secret with regard to at least the first common secret, aid prover sending the first message to the verifier, and the verifier creating a first caType: GrantFiled: November 27, 2006Date of Patent: April 2, 2013Assignee: Koninklijke Philips Electronics N.V.Inventors: Stefan Jean Maubach, Claudine Viegas Conrado, Geert Jan Schrijen
-
Publication number: 20120179952Abstract: Systems for generating an identifying response pattern comprising a memory (120) used as a physically unclonable function configured for generating a response pattern dependent on physical, at least partially random characteristics of said memory may be vulnerable to freezing attacks and to aging. A memory-overwriting device (110) configured for overwriting at least a first portion of the plurality of memory locations to obscure the response pattern in the memory avoids freezing attacks. An anti-degradation device (160) configured to write to each respective location of a second portion of the plurality of memory locations an inverse of a response previously read from the memory reduces the effects of aging.Type: ApplicationFiled: August 6, 2010Publication date: July 12, 2012Inventors: Pim Theo Tuyls, Geert Jan Schrijen
-
Patent number: 8176106Abstract: The present invention relates to a method and a device (11) using a physical token (14), which provides measurable parameters, to derive at least one data set. A plurality of values of one or more of the parameters are measured. From these measured values, a measure of variance is calculated. Quantization intervals into which a measured value is to be quantized are then determined. A possible value of a data set, which subsequently can be derived from a measured value provided by the physical token, is associated with each quantization interval. Further, information which subsequently enables determination of these quantization intervals is stored. Hence, an enrolling phase has been completed. When the preparing phase has been completed, a deriving phase may commence. When a data set is to be derived, for example to be used as a cryptographic key, a value of any one of the parameters provided by the PUF is measured.Type: GrantFiled: December 12, 2006Date of Patent: May 8, 2012Assignee: NXP B.V.Inventors: Geert Jan Schrijen, Boris Skoric
-
Publication number: 20120072737Abstract: In systems for establishing a cryptographic key depending on a physical uncloneable function (PUF) it may be a problem that internal information correlated with the cryptographic key is leaked to the outside of the system via a side-channel. To mitigate this problem a cryptographic system for reproducibly establishing a cryptographic key is presented. The system comprises a physical system comprising a physical, at least partially random, configuration of components from which an initial bit-string is derived. An error corrector corrects deviations occurring in the initial bit-string. Through the use of randomization the error corrector operates on a randomized data. Information leaking through a side channel is thereby reduced. After error correction a cryptographic key may be derived from the initial bit-string.Type: ApplicationFiled: February 10, 2010Publication date: March 22, 2012Inventors: Geert Jan Schrijen, Pim Theo Tuyls, Helena Handschuh
-
Publication number: 20110286599Abstract: An electronic system (100) having a memory (1 12, 1 14, 1 16) with multiple memory locations, each specific memory location of the multiple memory locations being arranged to produce a respective value, the respective value depending on a physical, at least partially random, configuration of components constructing the specific memory location, the electronic system comprises a key extraction means (130) arranged to retrieve multiple values in a first order from the multiple memory locations and for determining a reproducible cryptographic key in dependency on the multiple values, characterized in that the electronic system further comprises a re-ordering (120) means in between the memory and the key extraction means for providing the multiple values to the key extraction means in a second order, different from the first order, prior to determining the cryptographic key.Type: ApplicationFiled: November 17, 2009Publication date: November 24, 2011Inventors: Pim Theo Tuyls, Geert Jan Schrijen, Daniel Willem Elisabeth Schobben
-
Publication number: 20110215829Abstract: A method of generating a response to a physically unclonable function, said response being uniquely representative of the identity of a device having challengeable memory, the memory comprising a plurality of logical locations each having at least two possible logical states, the method comprising applying a challenge signal to an input of said memory so as to cause each of said logical locations to enter one of said two possible logical states and thereby generate a response pattern of logical states, said response pattern being dependent on said physically unclonable function which is defined by, the physical characteristics of said memory, the method further comprising reading out said response pattern.Type: ApplicationFiled: August 18, 2008Publication date: September 8, 2011Applicant: INTRINSIC ID B.V.Inventors: Jorge Guajardo Merchan, Sandeep Shankaran Kumar, Pim Theo Tuyls, Geert Jan Schrijen
-
Patent number: 7978859Abstract: The present invention relates to a method, a device and a system for preventing unauthorized introduction of content items in a network containing compliant devices and enabling users in the network to be anonymous. A basic idea of the present invention is to provide a CA (206) with a fingerprint of a content item to be introduced in a network at which the CA is arranged. Further, the CA is provided with an identifier of a content introducer (201), which introduces the particular content item in the network. The CA compares the fingerprint to a predetermined set of fingerprints, and content item intro?duction is allowed if the content item fingerprint cannot be found among the fingerprints comprised in the set. On introduction of the content item, the CA generates a pseudonym for the content introducer and creates a signed content ID certificate comprising at least said fingerprint and a unique content identifier for the content item and the pseudonym of the content introducer.Type: GrantFiled: January 19, 2006Date of Patent: July 12, 2011Assignee: Koninklijke Philips Electronics N.V.Inventors: Claudine Viegas Conrado, Geert Jan Schrijen, Milan Petkovic
-
Publication number: 20100026461Abstract: It is described a RFID device (231a, 231b, 231c, 331) comprising a data memory (236) and an electronic circuit arrangement (237, 238, 239, 247) coupled thereto. The electronic circuit arrangement has a first and a second operational configuration, wherein by receiving a control command (250a) the electronic circuit arrangement can be switched irreversibly from the first to the second configuration. The RFID device further comprises a communication interface (245) being coupled to the electronic circuit arrangement. In the first configuration the RFID device is adapted to communicate with a standard RFID reader (110) via the communication interface. In the second configuration the communication with the standard RFID reader is disabled and the RFID device is adapted to communicate with a readout-RFID device (370). The RFID device may be equipped with a secondary communication interface that can be used to communicate with the RFID device in a privacy-preserving manner.Type: ApplicationFiled: September 19, 2007Publication date: February 4, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Jorge Guajardo Merchan, Geert Jan Schrijen, Claudine Viegas Conrado, Antoon Marie Henrie Tombeur, Pim Theo Tuyls
-
Publication number: 20090235352Abstract: In order to provide a management system (100) as well as a method for managing at least one installation right (40a) to install at least one application (46, 42) on a smart card (300), in particular on a multi-application smart card, wherein it is possible that at least one first party or first unit (10) controlling the application(s), in particular on the smart card (300), in particular the smart card issuer, is able to transfer (44) this control to at least one second party or second unit (20), it is proposed that the management system (100) is designed to manage said installation right (40a), in particular on the smart card (300), insofar as the role of authorizing (22) at least one third party or third unit (30), in particular at least one third party application provider, to exert said installation right (40a), in particular to install its application (42) on the smart card (300), can be transferred (44) from at least one first party or first unit (10), in particular from the issuer of the smart card (30Type: ApplicationFiled: December 2, 2005Publication date: September 17, 2009Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Geert Jan Schrijen, Lutz Pape
-
Publication number: 20080282343Abstract: Present inventions relates to a method of digital rights management for content data, comprising the steps of: obtaining (102) at least one bio metric measurement data, modifying (106) the biometric measurement data by using a transformation scheme, and associating (108) the modified biometric measurement data with the content data.Type: ApplicationFiled: November 7, 2006Publication date: November 13, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Geert Jan Schrijen, Thomas Andreas Maria Kevenaar
-
Publication number: 20080271115Abstract: A method is presented for enabling authentication of a prover in a Radio Frequency Identification system comprising the prover and a verifier, the method comprising the steps of: the prover sending a prover identifier and a parent identifier to the verifier, the verifier sending a verifier identifier to the prover, the prover calculating a first common secret by means of a prover polynomial, where an unknown in the prover polynomial is substituted by a result calculated using a function of at least the verifier identifier, and the verifier calculating the first common secret by means of a first verifier polynomial, wherein a first unknown in the first verifier polynomial is substituted by the prover identifier and a second unknown in the first verifier polynomial is substituted by the parent identifier, the prover creating a first message by modulating a first core secret with regard to at least the first common secret, aid prover sending the first message to the verifier, and the verifier creating a first caType: ApplicationFiled: November 27, 2006Publication date: October 30, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Stefan Jean Maubach, Claudine Viegas Conrado, Geert Jan Schrijen
-
Publication number: 20080262788Abstract: The present invention relates to a method and a device (11) using a physical token (14), which provides measurable parameters, to derive at least one data set. A plurality of values of one or more of the parameters are measured. From these measured values, a measure of variance is calculated. Quantization intervals into which a measured value is to be quantized are then determined. A possible value of a data set, which subsequently can be derived from a measured value provided by the physical token, is associated with each quantization interval. Further, information which subsequently enables determination of these quantization intervals is stored. Hence, an enrolling phase has been completed. When the preparing phase has been completed, a deriving phase may commence. When a data set is to be derived, for example to be used as a cryptographic key, a value of any one of the parameters provided by the PUF is measured.Type: ApplicationFiled: December 12, 2006Publication date: October 23, 2008Applicant: NXP B.V.Inventors: Geert Jan Schrijen, Boris Skoric
-
Publication number: 20080256600Abstract: This invention relates to physical uncloneable function (PUF) devices for determining authenticity of an item, systems for determining authenticity of a physical item, and methods for determining authenticity of an item. A PUF pattern of the PUF device is damaged when using the item for the first time.Type: ApplicationFiled: September 6, 2006Publication date: October 16, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Geert Jan Schrijen, Pim Theo Tuyls, Thomas Andreas Maria Kevenaar
-
Publication number: 20080222426Abstract: A security device comprising means for authenticating an entity using biometric data, characterized by means for alternatively authenticating the entity using a security code such as a personal identification number. Also a system configured to grant an authorization upon a successful authorization by the security device, in which the authorization granted after the authentication using the security code is restricted in scope compared to the authorization granted after the authentication using the biometric data.Type: ApplicationFiled: January 26, 2006Publication date: September 11, 2008Applicant: Koninklijke Philips Electronics, N.V.Inventors: Geert Jan Schrijen, Pim Theo Tuyls