Impregnable Brand Protection For Non-Electronic Products

Slides:



Advertisements
Similar presentations
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
Advertisements

A Survey on Dual Interface and Multi Technology Cards ICMA – EXPO 2004 Prague, 17th – 20th October Presented by: Thies Janczek.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Physical Unclonable Functions and Applications
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Why Comply with PCI Security Standards?
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Authentication Approaches over Internet Jia Li
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
RFID Payment Terminal Presented by: Rohit Kale. Introduction RFID: an automatic identification method, relying on storing and remotely retrieving data.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
Embedded system security
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
The Federal Information Processing Standards (FIPS) Encryption Suite Sean Smith COSC
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
Computer Security module October 2008 Mark D. Ryan HP Labs, Bristol University of Birmingham Trusted Platform Module (TPM) introduction.
VIA PUF & PUF WinLink Co., Ltd. Contact : Ricky Kwak / 곽민호
enterprise Software Solutions Lab Pvt Ltd
CLOUDENTIFY.
Make your packaging Smarter
Web Applications Security Cryptography 1
Ontwikkelingen in functioneel en smart printing
Security Using Armstrong Numbers and Authentication using Colors
Symmetric Cryptography
SDM5A-M 7P/180D LP2(H).
Hardware security: The use of a Trusted Platform Module
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Difference Between SOC (System on Chip) and Single Board Computer
Protect Your Hardware from Hacking and Theft
Hardware Cryptographic Coprocessor
Merging Security and Convenience with Seos® Credential Technology
Presenter’s Name: Min-kai Hsiao EMU PGR Conference 5th July 2012
Security Barriers Asset Proper Access Attack Security System
About Us Delta Smart Innovation and Delta Corner Automobile Establishment Company are the flagship companies of EBAWA Group. Delta Smart Innovation has.
IoT Chip Market Size, Share, Trends, Growth and Demand Forecast to 2023 The global IoT chip market is likely to grow from $4,582.6 million in 2013 to IoT.
GSM & GPRS Security Training
High Secured Inter-Cloud Connectivity via Public Networks
12 E-Commerce Overview.
Cryptography Basics and Symmetric Cryptography
Jeremie S. Kim Minesh Patel Hasan Hassan Onur Mutlu
Security through Encryption
برنامج أمن أنظمة الحاسب
Protect Your Hardware from Hacking and Theft
User-mode Secret Protection (SP) architecture
The Secure Sockets Layer (SSL) Protocol
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Five Key Computer Components
Engineering Secure Software
Install AD Certificate Services
Module 2 OBJECTIVE 14: Compare various security mechanisms.
ONLINE SECURE DATA SERVICE
Physical Unclonable Functions and Applications
【Date: 】
Exercise: Hashing, Password security, And File Integrity
Unit 8 Network Security.
Computer Generations.
1.Introduction to Advanced Digital Design (14 marks)
Global megatrends (relevant for our business)
RUBIDEX Blockchain Overview RUBIDEX.NET-A reliable Blockchain Solution.
LM 7. Cellular Network Security
Presentation transcript:

Impregnable Brand Protection For Non-Electronic Products ICTK Co., Ltd. 3/5 fl, Vforum Building, 323 Pangyo-ro, Bundang, Gyunggi-do, Korea 13488 TEL : + 82-31-739-7890 FAX : +82-31-739-7891 www.ictk.com puf@ictk.com contact@ictk.com Impregnable Brand Protection For Non-Electronic Products Based on VIA PUF

Counterfeit Industry

Conventional Anti-Counterfeit Technologies Hologram ALL CLONED Smartcard chip Poor Security Nano Ink

What is new Technology? VIA PUF + NFC or RFID Security Function Physical Unclonable Function Connectivity Function To link non-electronic products to electronic world

What’s PUF? Physical Unclonable Function Utilize micro tolerance of semiconductor process Same process & same design, but unique pattern on every chip Unclonable finger print on the chip “Fingerprint on IC”

Conventional Security Vulnerability in conventional security solution Solution based on SW and memory Store KEY & Cipher data <encrypted data> in memory Attackers steal the KEY & Cipher data from NVM Storing KEY safely never perfect Attacking technology advancing Plain data Cipher data KEY Cipher Data Non Volatile Memory Cryptography

Attacking Technology Advancing Shorter hacking time as reverse engineering technology advancing Hacking time getting shorter Steal the KEY from Infineon TPM memory 6months for device analysis, 6hours to steal the KEY 3months for device analysis Reverse engineering technique advanced Black Hat 2010 Black Hat 2015 2020?

PUF Security = ROOT of TRUST New Paradigm of Security Solution based on PUF/HW and memory Store only Cipher data<encrypted data> in memory KEY generated from physical status & goes back to physical status after use Attackers can steal only Cipher data Without KEY, never decrypt Plain data Cipher data KEY Cipher Data Non Volatile Memory Cryptography PUF Cipher data encrypted by PUF KEY is perfectly SAFE

What is VIA PUF? Utilize VIA holes between metal layers Certain hole size gives “open or short” randomly by recipe not by design The combination of this “open and short” generates VIA PUF

VIA PUF Hole Formation Via size A Via size B Via size C Via Hole Size: XM Metal 1 Metal 2 Value 1 Via size A Via size B Via size C

VIA PUF Hole Formation Multi-size holes used Via Hole Size: XM Metal 1 Metal 2 Value 1 Via size A Via size B Via size C Multi-size holes used Combine multi holes to a bit of VIA PUF Ensure high randomness

The 1st volume production in the world Produced multi-millions pieces Advantages of VIA PUF Excellent repeatability Complies JEDEC standard for reliability test High Quality of Randomness Satisfies “ NIST SP800-90B” test suit No Error Correction Circuit required Smaller real estate The 1st volume production in the world Since July, 2016 – Giant IL005 Produced multi-millions pieces

What is new Technology? VIA PUF + NFC or RFID Security Function Physical Unclonable Function Connectivity Function To link non-electronic products to electronic world

Giant 2 Small Semiconductor = VIA PUF + NFC All Keys and Data protected by VIA PUF is safe from any type of attacks Unclonable NFC Memory SHA2 VIA PUF Control Logic ISO 14443-3A ISO7816 part4 ISO-14443-4(type A) 13.56MHz

Giant Security Module Integrate Giant 2 + NFC antenna Size can be as small as button Sticker, PET mould, water proof, etc...

Concept of Operation Each product has VIA security module Display authenticate authenticate Server Smartphone Giant Security Module Display pass or fail result Each product has VIA security module Authenticate through consumer’s smartphone Server centric authentication Collect consumer data

Advantages Perfect brand protection Higher customer satisfaction Collect big data of customers Direct Promotion to customers Better customer relationship management

Thank you. TEL : + 82-31-739-7890 FAX : +82-31-739-7891 www.ictk.com puf@ictk.com contact@ictk.com