Patent application number | Description | Published |
20120037711 | SEMICONDUCTOR CHIP AND METHOD FOR GENERATING DIGITAL VALUE USING PROCESS VARIATION - Provided is a semiconductor chip to generate an identification key. The semiconductor chip may include a first inverter having a first logic threshold, a second inverter having a second logic threshold, and a first switch. The first switch may include a first terminal and a second terminal, and may short or open a connection between the first terminal and the second terminal according to an first input voltage value. An input terminal of the first inverter, an output terminal, and the first terminal of the first switch may be connected to a first node. An output terminal of the first inverter, an input terminal of the second inverter, and the second terminal of the first switch may be connected to a second node. | 02-16-2012 |
20130093502 | APPARATUS AND METHOD FOR GENERATING DIGITAL VALUE - Provided is an apparatus for generating a digital value that may generate a random digital value, and guarantee time invariance of the generated digital value. The apparatus may include a digital value generator to generate a random digital value using semiconductor process variation, and a digital value freezing unit that may be connected to the digital value generator and fixed to one of a first state and a second state based on the generated digital value, to freeze the digital value. | 04-18-2013 |
20130101114 | APPARATUS AND METHOD FOR GENERATING IDENTIFICATION KEY - Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by violating a design rule provided during a semiconductor manufacturing process. The identification key generating apparatus may include an identification key generator to generate an identification key based on whether a contact or a via used to electrically connect conductive layers in a semiconductor chip shorts the conductive layers, and an identification key reader to read the identification key by reading whether the contact or the via shorts the conductive layers. | 04-25-2013 |
20130322624 | ENCRYPTION DEVICE AND METHOD FOR DEFENDING A PHYSICAL ATTACK - Provided are a security device and a method for operating same. The security device may conceal an encryption key used for an encryption algorithm in an encryption module in correspondence to security attacks such as reading information on where the encryption key is stored in a memory by disassembling an IC chip, or extracting said information through microprobing. The encryption key may be included as a physical encryption key module in an encryption module, and a certain storage medium for storing the encryption key may be included in the encryption module. Accordingly, the encryption key is not transmitted via a bus in a security device for encryption. | 12-05-2013 |
20140298431 | Information Security System in Smart Mobile Environment - Provided is a security communication method of a terminal device. A first authentication unit of the terminal device identifies a first subscriber to connect a first communication network. A second authentication unit of the terminal device exclusively operates with the first authentication unit, and identifies a second subscriber to connect a second communication network which is different from the first communication network. When the second subscriber is identified, at least one external communication module of the terminal device can be inactive. | 10-02-2014 |
20150109022 | SEMICONDUCTOR CHIP AND METHOD FOR GENERATING DIGITAL VALUE USING PROCESS VARIATION - Provided is a semiconductor chip to generate an identification key. The semiconductor chip may include a first inverter having a first logic threshold, a second inverter having a second logic threshold, and a first switch. The first switch may include a first terminal and a second terminal, and may short or open a connection between the first terminal and the second terminal according to a first input voltage value. An input terminal of the first inverter, an output terminal, and the first terminal of the first switch may be connected to a first node. An output terminal of the first inverter, an input terminal of the second inverter, and the second terminal of the first switch may be connected to a second node. | 04-23-2015 |
20150127537 | IC Chip for Preventing Identification Key Leak and Authorization Method Thereof - Disclosed are an IC chip for preventing identification key leak and an authorization method thereof. An IC chip capable of performing a financial function includes: a PIN supply unit for supplying a PIN used for authorization when performing a financial function using the IC chip; and a blocking unit for physically blocking the gap between the PIN supply unit and an input-output interface when the PIN is supplied to the outside through the input-output interface at an initial access of the IC chip. | 05-07-2015 |
20150195085 | ENCRYPTION DEVICE AND METHOD FOR DEFENDING A PHYSICAL ATTACK - Provided are a security device and a method for operating same. The security device may conceal an encryption key used for an encryption algorithm in an encryption module in correspondence to security attacks such as reading information on where the encryption key is stored in a memory by disassembling an IC chip, or extracting said information through microprobing. The encryption key may be included as a physical encryption key module in an encryption module, and a certain storage medium for storing the encryption key may be included in the encryption module. Accordingly, the encryption key is not transmitted via a bus in a security device for encryption. | 07-09-2015 |