DARPA Toolbox<\/a> initiative is an agency-wide effort to provide open licensing opportunities with commercial technology vendors to the researchers behind DARPA programs. Through DARPA Toolbox, defense contractors will receive greater access to commercial vendors\u2019 technologies and tools via pre-negotiated, low-cost, non-production access frameworks and simplified legal terms. For commercial vendors, DARPA Toolbox will provide an opportunity to leverage the agency\u2019s forward-looking research and a chance to develop new revenue streams based on programmatic achievements developed with their technologies.<\/p>\n\n\n\n\u201cWith eMemory joining DARPA\u2019s Toolbox Initiative we are adding OTP (one time programmable) memories and unique identity enabling PUF (physical unclonable function)- related security solution IP\u2019s.\u201d said Serge Leef, Program Manager, leading DARPA Toolbox. \u201cOur researchers can use these IPs to accelerate development for their projects.\u201d<\/p>\n\n\n\n
eMemory is among a select group of technology companies that have engaged in partnership under DARPA Toolbox.<\/p>\n\n\n\n
\n\n\n\n\u71b5\u78bc\u79d1\u6280\u8207\u529b\u65fa\u96fb\u5b50\u5408\u4f5c\u958b\u767c\u5168\u65b9\u4f4d\u786c\u9ad4\u5b89\u5168\u89e3\u6c7a\u65b9\u6848<\/h3>\n\n\n\n
(\u53f0\u7063\u65b0\u7af9,2021<\/strong>\u5e74<\/strong>6<\/strong>\u6708<\/strong>17<\/strong>\u65e5<\/strong>)<\/strong> \u53f0\u7063\u786c\u9ad4\u5b89\u5168IP\u4f9b\u61c9\u5546\u71b5\u78bc\u79d1\u6280\u806f\u624b\u5176\u6bcd\u516c\u53f8\u529b\u65fa\u96fb\u5b50\uff0c\u6191\u85c9\u786c\u9ad4\u5b89\u5168IP\u6280\u8853\u7372\u5f97DARPA (Defense Advanced Research Projects Agency)\u8a8d\u53ef\uff0c\u65d7\u4e0b\u591a\u9805\u7522\u54c1\u7372DARPA \u63a1\u7528\u5217\u5165Toolbox \u4f9b\u61c9\u93c8\uff0c\u672a\u4f86\u5c07\u9032\u4e00\u6b65\u53c3\u8207DARPA\u63a8\u52d5\u4e4b\u591a\u9805\u5b89\u5168\u67b6\u69cb\u767c\u5c55\u8a08\u5283\u3002<\/p>\n\n\n\n\u529b\u65fa\u96fb\u5b50\u6240\u7814\u767c\u4e4bNeoFuse (One-Time Programmable Memory; OTP) \u548cNeoPUF (Physical Unclonable Function; PUF) \u4e43\u786c\u9ad4\u5b89\u5168\u5132\u5b58\u53ca\u7522\u751f\u5bc6\u9470\u6240\u9700\u4e4b\u57fa\u77f3\u3002\u800c\u71b5\u78bc\u79d1\u6280\u5229\u7528\u529b\u65fa\u96fb\u5b50\u4e4bOTP\u53caPUF\u958b\u767c\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839PUFrt\u4ee5\u53ca\u786c\u9ad4\u5b89\u5168\u8655\u7406\u5668PUFiot\uff0c\u5728\u786c\u9ad4\u5b89\u5168\u6700\u91cd\u8981\u7684\u95dc\u9375\u6280\u8853\u4e0a\u8de8\u51fa\u5275\u65b0\u7684\u4e00\u6b65\u3002<\/p>\n\n\n\n
\u71b5\u78bc\u79d1\u6280\u4e0d\u65b7\u62d3\u5c55\u3001\u5275\u65b0PUF\u61c9\u7528\uff0c\u5229\u7528\u6b64\u7368\u7279\u4e14\u4e0d\u53ef\u8907\u88fd\u7684\u300c\u6676\u7247\u6307\u7d0b\u300d\u6280\u8853\uff0c\u958b\u767c\u51fa\u517c\u5177\u539f\u751f\u786c\u9ad4\u6307\u7d0bPUF\u3001\u5b89\u5168\u5b58\u5132OTP\u3001\u9ad8\u54c1\u8ceatRNG\uff08\u771f\u4e82\u6578\u7522\u751f\u5668\uff09\u3001\u65b9\u4fbf\u7cfb\u7d71\u6574\u5408\u7684\u63a7\u5236\u5668\u8207\u7cfb\u7d71\u63a5\u53e3 (APB)\u3001\u8207\u5168\u65b9\u4f4d\u7684\u9632\u7ac4\u6539\u8a2d\u8a08\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839IP –PUFrt\uff0c\u70ba\u5e02\u5834\u5e36\u4f86\u6613\u6574\u5408\u3001\u6027\u50f9\u6bd4\u9ad8\u7684\u786c\u9ad4\u5b89\u5168\u65b9\u6848\u9078\u64c7\u3002PUFiot\u5247\u662f\u5728\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839\u6280\u8853\u4e0a\u7d0d\u5165\u52a0\u5bc6\u6f14\u7b97\u6cd5\u5354\u52a9\u5ba2\u6236\u52a0\u901f\u8a2d\u8a08\u6574\u5408\uff0c\u53ef\u642d\u914dCPU\u6838 (\u5982RISC-V)\uff0c\u626e\u6f14\u5b89\u5168\u5354\u540c\u8655\u7406\u5668\u89d2\u8272\u4f86\u57f7\u884c\u61c9\u7528\u7a0b\u5f0f\u6240\u9700\u5b89\u5168\u529f\u80fd\uff0c\u5be6\u73fe\u5168\u65b9\u4f4d\u7684\u5b89\u5168\u4e2d\u592e\u8655\u7406\u5668\u3002<\/strong><\/p>\n\n\n\nDARPA\u4e3b\u8981\u8ca0\u8cac\u958b\u767c\u7528\u65bc\u570b\u9632\u61c9\u7528\u4e4b\u65b0\u6280\u8853\uff0c\u5176\u8ca0\u8cac\u7684\u5c08\u6848\u5206\u5225\u7531\u4e03\u500b\u8fa6\u516c\u5ba4\u4f86\u57f7\u884c\uff0c\u8fd1\u5e7e\u5e74\u6301\u7e8c\u63a8\u52d5\u786c\u9ad4\u5b89\u5168\uff08Hardware security\uff09\u7684\u8a08\u756b\u5373\u7531\u5176\u4e2dMicrosystem Technology Office (MTO)\u8ca0\u8cac\u57f7\u884c\uff0c\u76f8\u95dc\u8a08\u756b\u5982\u4e0b\uff1a<\/p>\n\n\n\n
- Supply Chain Integrity for Electronics Defense (SHIELD)
\u65e8\u5728\u5efa\u7acb\u5b89\u5168\u4f9b\u61c9\u93c8\uff0c\u9632\u6b62\u76dc\u7248\u6676\u7247\u6216\u662f\u672a\u7d93\u8a8d\u8b49\u7684\u6676\u7247\u9032\u5165\u786c\u9ad4\u7cfb\u7d71\u8a2d\u5099\u3002<\/li> - System Security Integration Through Hardware and Firmware (SSITH)
\u76ee\u6a19\u70ba\u958b\u767c\u786c\u9ad4\u7684\u5b89\u5168\u67b6\u69cb\u4e26\u7d50\u5408\u8edf\u9ad4\u4ee5\u63d0\u5347\u7cfb\u7d71\u6574\u9ad4\u5b89\u5168\uff0c\u9632\u6b62\u99ed\u5ba2\u5f9e\u9060\u7aef\u7834\u58de\u3002\u540c\u6642\u4ea6\u958b\u767c\u8a55\u4f30\u5de5\u5177\u4f86\u6e2c\u8a66\u6240\u63d0\u7684\u786c\u9ad4\u5b89\u5168\u67b6\u69cb\u662f\u5426\u6709\u6548\u3002<\/li> - Automatic Implementation of Secure Silicon (AISS)
\u4e3b\u8981\u4efb\u52d9\u70ba\u958b\u767cEDA tool\uff0c\u76ee\u6a19\u5728\u8a2d\u8a08\u968e\u6bb5\u5373\u80fd\u6aa2\u8996\u53ef\u80fd\u88ab\u99ed\u7684SoC\u8a2d\u8a08\u6f0f\u6d1e\uff08\u5982\u690d\u5165\u6728\u99ac\u6216\u662f\u932f\u8aa4\u8a0a\u865f\uff09\u4e26\u8003\u91cf\u9632\u79a6\u5c0d\u7b56\u3002<\/li> - Asset Management Infrastructure (AMI)
\u65e8\u5728\u7522\u54c1\u751f\u547d\u9031\u671f\u5b89\u5168\u7ba1\u7406\uff08Product lifecycle security management\uff09\u7684\u958b\u767c\uff0c\u7d50\u5408\u5340\u584a\u93c8\u6280\u8853\u4f86\u9054\u5230\u7ba1\u7406\u5bc6\u9470\u3001\u7c3d\u7ae0\u3001\u8a8d\u8b49\u5b89\u5168\u653f\u7b56\u4ee5\u53ca\u8cc7\u6599\u8ffd\u8e64\uff0c\u4f86\u78ba\u4fdd\u6676\u7247\u5728\u6574\u500b\u7522\u54c1\u751f\u547d\u9031\u671f\u5167\u7684\u5b89\u5168\u3002<\/li><\/ol>\n\n\n\n\u71b5\u78bc\u79d1\u6280\u548c\u529b\u65fa\u96fb\u5b50\u7684OTP\u3001PUF\u3001PUFrt\uff08\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839\uff09\u53caPUFiot\uff08\u786c\u9ad4\u5b89\u5168\u8655\u7406\u5668\uff09\u7b49\u5275\u65b0IP\u80fd\u5f37\u5316\u667a\u6167\u9023\u7db2\u4e16\u4ee3\u6240\u9700\u7684\u786c\u9ad4\u5b89\u5168\u67b6\u69cb\u3001\u5be6\u73fe\u6574\u5408\u89e3\u6c7a\u65b9\u6848\uff0c\u5354\u52a9\u5ba2\u6236\u63d0\u5347\u7522\u54c1\u9632\u507d\u80fd\u529b(anti-counterfeit)\u3001\u9632\u6b62\u8d85\u91cf\u751f\u7522(anti-overproduction) \u4ee5\u53ca\u5f37\u5316\u6574\u9ad4\u751f\u547d\u9031\u671f\u4e2d\u7684\u5b89\u5168\u7ba1\u7406\uff0c\u56e0\u800c\u53d7DARPA\u80af\u5b9a\u3002\u672a\u4f86\u5c07\u9032\u4e00\u6b65\u53c3\u8207DARPA\u63a8\u52d5\u4e4b\u5b89\u5168\u67b6\u69cb\u767c\u5c55\u8a08\u5283\uff0c\u5305\u62ec\u4f9b\u61c9\u93c8\u7684\u5b89\u5168 \uff08SHIELD Program\uff09\u3001\u786c\u9ad4\u5b89\u5168\u7684\u65b0\u67b6\u69cb\uff08SSITH\/AISS Program\uff09\u3001\u8cc7\u7522\u7ba1\u7406\u67b6\u69cb \uff08AMI Program\uff09\u7b49\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"
The agreement makes NeoFuse, NeoPUF and PUF-based security IPs available to the researchers behind DARPA programs.<\/p>\n","protected":false},"author":3,"featured_media":1871,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[217,26,36],"class_list":["post-1980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-crypto-coprocessor","tag-puf","tag-root-of-trust"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/1980"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=1980"}],"version-history":[{"count":7,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/1980\/revisions"}],"predecessor-version":[{"id":4694,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/posts\/1980\/revisions\/4694"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media\/1871"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=1980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/categories?post=1980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/tags?post=1980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}