Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

PUF Technology Patent Licensed to Verayo

Verayo : 24 March, 2010  (New Product)
Verayo has secured rights to an MIT patent for the use of Physical Unclonable Function or PUF technology for encryption
Verayo announces its exclusive rights to US patent number 7,681,103, titled “Reliable Generation Of A Device-Specific Value,” granted to MIT by the US Patent and Trademark Office. This fundamental patent covers, for example, reliable generation of silicon chip-unique values using Physical Unclonable Function (PUF) technology. Such chip-unique values can be used as dynamic, volatile secret keys for cryptographic operations.

“This licence to the issued patents is a significant milestone for moving this technology into various commercial applications in the security and authentication industry,” said Dr Srini Devadas, Professor of Electrical Engineering and Computer Science at MIT and CTO and co-founder at Verayo.

PUF-based key generation significantly elevates security and trust in cryptography-based solutions. Current state-of-the-art cryptography is based on keys that are typically stored on-chip. These keys are then used to authenticate and encrypt sessions for various applications such as identification, access control or financial transactions. With PUFs, such cryptographic solutions can provide a higher level of security and trust by dynamically generating chip-unique (or shared) volatile, though robust/reproducible, cryptographic keys, instead of storing and securing these keys. Additionally, a PUF-based cryptography solution can generate multiple, volatile secret root master keys even after being deployed in the field. This allows PUF-based cryptography solutions to renew root master keys in the field or support multiple vendors, features and functions.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   Â© 2012 ProSecurityZone.com
Netgains Logo