Abstract: | Deterrence of device subversion by substitution may be achieved by
including a cryptographic fingerprint unit within a computing device for
authenticating a hardware platform of the computing device. The
cryptographic fingerprint unit includes a physically unclonable function
("PUF") circuit disposed in or on the hardware platform. The PUF circuit
is used to generate a PUF value. A key generator is coupled to generate a
private key and a public key based on the PUF value while a decryptor is
coupled to receive an authentication challenge posed to the computing
device and encrypted with the public key and coupled to output a response
to the authentication challenge decrypted with the private key. |