Intel Corporation
SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION IN SUPPLY CHAIN
Last updated:
Abstract:
A first semiconductor device includes a processor configured to generate a random number at initial test of a second semiconductor device after fabrication of the second semiconductor device in a supply chain related to the second semiconductor device, and send the generated random number to the second semiconductor device. The processor is further configured to receive a first signature that is signed over the sent random number by the second semiconductor device using a first private key that is stored in the second semiconductor device, among a first private and public key pair, and test the received first signature, using a first public key that is stored in the first semiconductor device, among the first private and public key pair, to determine whether the second semiconductor device is authenticated.
Utility
22 Dec 2021
14 Apr 2022