Patents by Inventor Pim T. Tuyls
Pim T. Tuyls has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9129671Abstract: A method (100) is disclosed of generating an identifier from a semiconductor device (600) comprising a volatile memory (610) having a plurality of memory cells. The method comprises causing (110) the memory cells to assume a plurality of pseudo-random bit values inherent to variations in the microstructure of the memory cells; retrieving (120) the bit values from at least a subset of the plurality of memory cells; and generating the identifier from the retrieved bit values. The method (100) is based on the realization that a substantial amount of the cells of a volatile memory can assume a bit value that is governed by underlying variations in manufacturing process parameters; this for instance occurs at power-up for an SRAM or after a time period without refresh for a DRAM.Type: GrantFiled: April 4, 2007Date of Patent: September 8, 2015Assignee: NXP B.V.Inventors: Roelof H. W. Salters, Rutger S. Van Veen, Manuel P. C. Heiligers, Abraham C. Kruseman, Pim T. Tuyls, Geert J. Schrijen, Boris Skoric
-
Patent number: 8446250Abstract: This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator.Type: GrantFiled: June 10, 2008Date of Patent: May 21, 2013Assignee: Intrinsic ID B.V.Inventors: Klaus Kursawe, Pim T. Tuyls
-
Patent number: 8339875Abstract: A method for alleviating burn-in effect and enabling performing a start-up process in respect of a device comprising a plurality of challengeable memory elements, wherein the memory elements are able to, upon start-up, generate a response pattern of start-up values useful for identification as the response pattern depends on physical characteristics of the memory elements, the method comprising the step of, after start-up of the memory elements, writing a data pattern to the memory elements which is inverse to a response pattern that was previously read from the same memory elements. Thus, degradation of the PMOS transistors due to NBTI can be alleviated.Type: GrantFiled: April 16, 2009Date of Patent: December 25, 2012Assignees: Intrinsic ID B.V., NXP B.V.Inventors: Pim T. Tuyls, Geert J. Schrijen, Abraham C. Kruseman
-
Patent number: 8143705Abstract: The invention relates to a tamper-resistant semiconductor device comprising a substrate (5) comprising an electronic circuit arranged on a first side thereof. An electrically-conductive protection layer (50, 50a, 50b) is arranged on a second side of the substrate (5) opposite to the first side. At least three through-substrate electrically-conductive connections (45) extend from the first side of the substrate (5) into the substrate (5) and in electrical contact with the electrically-conductive protection layer (50, 50a, 50b) on the second side of the substrate (5). A security circuit is arranged on the first side connected to the through-substrate electrically-conductive connections (45) and is arranged for measuring at least two resistance values (R12, R23, R34, R14, R13, R24) of the electrically-conductive protection layer (50, 50a, 50b) through the through-substrate electrically-conductive connections (45).Type: GrantFiled: July 29, 2008Date of Patent: March 27, 2012Assignee: NXP B.V.Inventors: Johannes A. J. Van Geloven, Pim T. Tuyls, Robertus A. M. Wolters, Nynke Verhaegh
-
Publication number: 20110103161Abstract: A method for alleviating burn-in effect and enabling performing a start-up process in respect of a device comprising a plurality of challengeable memory elements, wherein the memory elements are able to, upon start-up, generate a response pattern of start-up values useful for identification as the response pattern depends on physical characteristics of the memory elements, the method comprising the step of, after start-up of the memory elements, writing a data pattern to the memory elements which is inverse to a response pattern that was previously read from the same memory elements. Thus, degradation of the PMOS transistors due to NBTI can be alleviated.Type: ApplicationFiled: April 16, 2009Publication date: May 5, 2011Inventors: Pim T. Tuyls, Geert J. Schrijen
-
Publication number: 20100177898Abstract: The present invention relates to an electronic device, comprising a physical uncloneable function (PUF) module, and circuitry adapted to receive a cryptographic query (?) from an electronic unit, read, from the PUF module, data generated at a challenge of the PUF module, and generate a cryptographic response (?) based on the data, a random noise component comprised in the data, and the cryptographic query (?), thereby enabling authentication of the electronic device. An advantage with the invention is that it will not be necessary to include an additional random generator together with the electronic device, as the fuzzy output provided by the PUF module can be seen as already containing a random noise component. In some cryptographic schemes, the random noise provides for a possibility to reach a higher level of security and to minimize the possibility for a third party to find patterns in cryptographic responses generated during use of the electronic device.Type: ApplicationFiled: June 9, 2008Publication date: July 15, 2010Applicant: INTRINSIC ID BVInventors: Pim T. Tuyls, Jorge Guajardo Merchan
-
Publication number: 20100176920Abstract: This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator.Type: ApplicationFiled: June 10, 2008Publication date: July 15, 2010Applicant: INTRINSIC ID BVInventors: Klaus Kursawe, Pim T. Tuyls
-
Publication number: 20100121315Abstract: A wearable accessory controls (103) and provides security for a pill delivering medical substances and services. An initialization procedure allows decryption information (814) to be loaded into the accessory for each pill and/or decryption information (818) about the accessory to be loaded into the pill. The pill preferably sends encrypted messages to the accessory and the accessory preferably sends encrypted messages to the pill. The pill operates only when the proximity of the accessory is verified or authenticated during the operation of the pill, preferably at frequent intervals. Where the pill is no longer useful, its information can be deleted (1205) from memory in the accessory or other controlling device.Type: ApplicationFiled: March 28, 2008Publication date: May 13, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Karen I. Trovato, Pim T. Tuyls, Anne E. Barschall
-
Publication number: 20100070777Abstract: A method (100) is disclosed of generating an identifier from a semiconductor device (600) comprising a volatile memory (610) having a plurality of memory cells. The method comprises causing (110) the memory cells to assume a plurality of pseudo-random bit values inherent to variations in the microstructure of the memory cells; retrieving (120) the bit values from at least a subset of the plurality of memory cells; and generating the identifier from the retrieved bit values. The method (100) is based on the realization that a substantial amount of the cells of a volatile memory can assume a bit value that is governed by underlying variations in manufacturing process parameters; this for instance occurs at power-up for an SRAM or after a time period without refresh for a DRAM.Type: ApplicationFiled: April 4, 2007Publication date: March 18, 2010Applicant: NXP B.V.Inventors: ROELOF H. W. SALTERS, RUTGER S. VAN VEEN, MANUEL P. C. HEILIGERS, ABRAHAM C. KRUSEMAN, PIM T. TUYLS, GEERT J. SCHRIJEN, BORIS SKORIC
-
Patent number: 7555646Abstract: An efficient implementation of zero knowledge protocols for authentication of devices and for identification of devices connecting to a network. According to one aspect, the present invention provides a method of verifying the knowledge of a secret number s in a prover device by a verifier device having no knowledge of the secret number, with a zero-knowledge protocol using the Montgomery representation of numbers and Montgomery multiplication operations therein.Type: GrantFiled: November 21, 2003Date of Patent: June 30, 2009Assignee: NXP B.V.Inventors: Pim T. Tuyls, Bruce Murray