Registers – Systems controlled by data bearing records
Reexamination Certificate
2002-08-26
2004-10-12
Lee, Diane I. (Department: 2876)
Registers
Systems controlled by data bearing records
C700S116000
Reexamination Certificate
active
06802447
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates in general to random binary identification codes (IDs) subject to bit drift, and in particular to a method of authenticating an object that is, or has attached to it an apparatus, which in turn is, capable of generating such an ID code.
2. Description of Related Art
There are many forms of identification (ID), and IDs are used for many purposes. For example an ID may be provided in printed form (e.g., user-names or bank account numbers), in graphical form (e.g., a picture on a driver license or a barcode on a product), in the form of a magnetic field (e.g., as provided by a magnetic strip on a credit card), as an electronic code conveyed by a signal.
An ID may be used to indicate the type of object bearing the ID. For example, a barcode-encoded UPC on a cereal box in a grocery store enables a grocer to determine the price of the goods when all boxes of the same kind of cereal are printed with the same barcode. An ID may be used to distinguish an object from a population of similar objects. For example a user-name may distinguish one user of a computer network service from all other users of the service, or a bank account number may uniquely distinguish a customer account from all other bank accounts. An ID can be used to confirm that the bearer of an ID is a genuine member of a population. For example, a photograph on a driver's license is a form of ID used to confirm that the bearer of the driver's license is the individual named on the driver's license.
Signals conveying binary strings are often used as ID codes. For example each instance of a particular type of integrated circuit (IC) chip can be made to generate an output signal conveying a unique binary code ID. The ID generated by each IC may be used to distinguish that IC from among all other ICs, to verify that the particular IC is a genuine legitimate copy of an IC and not an illegitimate counterfeit. The ID generated by an IC can also be used to identify any larger electronic system in which it is incorporated. “Radio Frequency Identification” tags (RFIDs) are ICs that produce radio frequency signals conveying binary IDs. When the RFIDs are attached to objects, such as for example merchandise in a retail store, packages for delivery, the unique radio frequency ID codes they generate can serve the same identification purposes as barcodes.
There are many economic or other incentives for people to misuse IDs. For example when an ID identifies goods as having been produced by a particular source, a source of counterfeit goods would want to provide the counterfeit goods with IDs that incorrectly identify them as having been produced by that particular source. Thus counterfeiters not only try to counterfeit goods, they also seek to counterfeit IDs that are associated with those goods. Accordingly efforts have been made to render IDs difficult to copy or counterfeit. For example sophisticated procedures/algorithms and manufacturing processes are sometimes used to make IDs that are difficult for a counterfeiter to copy. A hologram is one example of a difficult to reproduce ID. Sometimes IDs are hidden or encoded in a way that makes it difficult for a would-be counterfeiter to discover them.
One way to foil an ID counterfeiter is to make it hard for the counterfeiter to determine which part of a code is actually being used as an ID. U.S. Pat. No. 5,367,148, issued Nov. 22, 1994 to Storch et al., entitled “Counterfeit detection using ID numbers with at least one random portion,” teaches the techniques of adding one or more “random” portions (each consisting of one or more digits) to an otherwise straightforward numerical ID, and of purposely using different presentations in the “external” appearance (e.g. as printed on the outside package box) of the ID and the “inner” appearance (e.g. inside the box on a customer return registration card), for detecting counterfeits. U.S. Pat. No. 6,212,638, issued Apr. 3, 2001 to Lee et al., entitled “Method for generating unpredictable authentication identification symbols,” teaches use of special mathematical functions to generate sequences of unpredictable ID symbols, and to employ an unpredictable subset of the symbols from such a sequence for an actual ID.
The IDs described by the above-mentioned prior art techniques are “static” in that, once a particular copy of an ID is generated, it stays the same each time the ID is presented. For example a barcode ID, once printed, never changes its appearance. A product serial number, once imprinted on the casing of a product or printed on a customer registration card, never changes its value. A user-name for logging into an on-line service remains the same once assigned.
U.S. Pat. No. 6,161,213, issued Dec. 12, 2000 to Keith Lofstrom, entitled “System for providing an integrated circuit with a unique identification,” describes a circuit (currently marketed under the trademark “ICID”) that may be incorporated into an IC chip for generating a unique ID for each IC in which it is embedded without requiring each IC to be separately processed. The ICID circuit includes an array of cells, and each cell controls the state of a separate bit of the ID to be generated based on relative doping levels within channels of transistors forming a part of the cell. Since the doping level randomly varies from transistor-to-transistor within an IC as a result of random process variations, the bit sequence of the ID produced by each copy of the ICID circuit is randomly established as the IC is fabricated. When the ID has a sufficiently large number of bits, the ID generated by each copy of the ICID circuit is highly likely to be unique even though a very large number of copies of the ICID circuit are manufactured.
The doping levels of the transistors of one or more of the ID cells of any given copy of an ICID circuit may be so similar that environmental variables such as ambient temperature and supply voltages can influence the ID bit state controlled by those cells. One characteristic of binary IDs produced by the ICID circuit is that a very small percentage of the bits of the ID it generates may not always be of the same state each time the ICID circuit generates the ID; the state of one or more bits of an ID may “drift” in that it changes from instance-to-instance of the generated ID. Thus the ID that the ICID circuit produces is “dynamic” in that it does not always have exactly the same value each time it is generated. However Lofstrom teaches that even though a few bits of each individual ID may drift, the ID can still be used to uniquely identify each IC from among a large population of ICIDs producing such IDs if the ID has a sufficiently large number of bits. Lofstrom teaches that two sufficiently long IDs may be considered with a high degree of confidence to have been produced by the same copy of an ICID circuit even though a few of their corresponding bits are not of matching states.
BRIEF SUMMARY OF THE INVENTION
The invention relates to a method for verifying that a particular object, such as for example an integrated circuit (IC), is a member of a population of similar objects.
In accordance with the invention, each population member is configured to generate a binary identification code (ID) that differs from IDs generated by all other members of the population. The ID generated by each member is dynamic in that all instances of the ID generated by a population member may not always have exactly the same value. While bits residing in most of the bit positions of a dynamic ID generated by any population member do not vary in state from instance-to-instance, bits residing in one or more other bit positions of the ID may “drift” in that they may vary in state from instance-to-instance of that ID.
A set of instances of the ID generated by each population member is analyzed to produce a separate “representative bit pattern” for the ID indicating the most commonly occurring state of each bit of the member's ID. The set of ID instances generated by each po
Bedell Daniel J.
ICID, LLC
Lee Diane I.
Smith-Hill and Bedell
LandOfFree
Method of authenticating an object or entity using a random... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of authenticating an object or entity using a random..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of authenticating an object or entity using a random... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3274610