PUF<\/a> and is a safer alternative against identifier cloning. This is because it can complete each stage (enrollment, authentication, and provisioning) internally within the chip and doesn\u2019t need to store secrets externally. Therefore, hardware-generated inborn UIDs eliminate the risk of exposure during the injection process. They also significantly reduce fabrication costs by eradicating the need for key injection and external key management.<\/p>\n\n\n\nThe PUF-based UID is the identifier for the follow-up authentication and authorization to an external network node, e.g., the host server shown in this figure below.<\/p>\n\n\n\n
<\/figure>\n","protected":false},"excerpt":{"rendered":"With a UID, chips can generate an internal secret as a seed for key generation or a root key and an external plaintext number for chip identification or product series number. UID can also be used as the device\u2019s identity by authentication and authorization algorithms to protect it from unauthorized access or cloning.<\/p>\n","protected":false},"author":2,"featured_media":3116,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"subjects":[227],"tech-tag":[231],"class_list":["post-3077","technology","type-technology","status-publish","has-post-thumbnail","hentry","subjects-cryptography","tech-tag-foundational-technology"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology\/3077"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/technology"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=3077"}],"version-history":[{"count":11,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology\/3077\/revisions"}],"predecessor-version":[{"id":5856,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology\/3077\/revisions\/5856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media\/3116"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=3077"}],"wp:term":[{"taxonomy":"subjects","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/subjects?post=3077"},{"taxonomy":"tech-tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/tech-tag?post=3077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}