| CPC G06F 21/44 (2013.01) | 8 Claims |

|
1. A hardware authentication method and its embedded software, the method comprising the following steps:
a) obtaining an identified record of each unique hardware and software device, the record selected from the group consisting of
at least one hash with a correspondence between an input value of at least one signal to a hardware and embedded software set and an output value of said at least one signal and/or a response time of the at least one output signal,
an electromagnetic signature, and
combinations thereof;
b)subsequently interrogating this same unique hardware and software device, for the comparison of said identified record obtained in the interrogation with that previously registered;
c) identifying corruption, tampering and/or intrusion/eavesdropping of the hardware/embedded software set when comparing records does not result in a match;
d) conducting a parameterized verification of electromagnetic signature (MVAE) comprising the steps of
i) defining a limit of similarity,
ii) determining when equality use by proximity by at least one of setting distance to amplitude and setting distance to frequency,
iii) obtaining the reading of the electromagnetic signature performed on a supplier's website and storing a reading of the electromagnetic signature performed on a supplier's website in a vector,
iv) obtaining the reading of the electromagnetic signature performed on a user's website and storing the reading of the electromagnetic signature performed on a user's website in a vector,
V) for each point of the electromagnetic signature obtained on the supplier's website:
determining when strict equality is being used by checking if each point of the electromagnetic signature obtained on the supplier's website is equal to a point of a same position in a vector of the electromagnetic signature obtained on the user's website, and if different, incrementing a counter of dissimilar peaks; and
determining when equality by tolerance window is being used by checking if the point of the same position in the vector of the electromagnetic signature obtained at the user's site is within the tolerance window and if different, incrementing the counter of dissimilar peaks;
vi) calculating the percentage of dissimilar peaks by dividing the counter of dissimilar peaks by the size of the vector created to store the electromagnetic signature obtained on the supplier's website; and
vii) if the percentage of different peaks equals zero the signatures are equal, if less than the limit of similarity then the signatures are similar, if greater the signatures are dissimilar.
|