Security key system

ABSTRACT

An aspect of the disclosure includes a security system and method having a key with nanoscale features. The key includes a body. At least one pattern member disposed on the body, the pattern member formed using a directed self-assembly polymer to define a pattern of random feature structures thereon, the feature structures having a width of less than 100 nanometers.

DOMESTIC PRIORITY

This application is a continuation of U.S. patent application Ser. No.15/009,953, filed Jan. 29, 2016, the contents of which is incorporatedby reference herein in its entirety.

BACKGROUND

The present invention relates generally to a security system and, morespecifically, to a security system having a key that includes nanometerscale features.

Security systems may be used in a variety of applications to preventaccess to unauthorized users. Security systems may be used to controlaccess to a physical location, such as an office, a bank vault or a safedeposit box for example. Security systems may also be used withelectronic systems, such as financial computer systems for example. Ineither application, the security system may include a physical key thatthe user engages with the security system to validate theirauthorization to access the secured area or system.

Traditionally the physical key had physical features (e.g. grooves andridges) that engaged corresponding features within the lock (e.g. a pinand tumbler lock). When the key features match the lock features, thelock is disengaged. The physical features of the key were typicallyground into the key, typically on a scale of millimeters in size. Thusthe size of the features was limited by the fabrication process. Morerecently, keys and locks have been made available that allow for laseretched key features, radio frequency identification (RFID) circuits andmagnetic circuits. This allowed for the “features” of the key to be madesmaller (e.g. micron scale) and increased in number, making it moredifficult for an unauthorized person to copy a key.

SUMMARY

Embodiments include a security system and method having a key withnanoscale features. The key includes a body. At least one pattern memberdisposed on the body, the pattern member formed using a directedself-assembly polymer to define a pattern of random feature structuresthereon, the feature structures having a width of less than 100nanometers.

In an embodiment, the at least one pattern member includes a pluralityof pattern members, each of the pattern members being formed using thedirected self-assembly polymer to define the pattern of random featurestructures thereon, each of the pattern of random feature structuresbeing different from the other patterns of random feature structures.This provides for increasing the number of combinations that may bemeasured for authenticating the key.

In an embodiment, the key further comprises at least a pair of contactscoupled to the body and electrically coupled to the pattern member. Thisprovides for a mechanism for measuring electrical parameters of thepattern member.

In an embodiment, the at least a pair of contacts includes a pluralityof pairs of contacts, each of pairs of the plurality of pairs ofcontacts being electrically coupled to one of the pattern members of theplurality of pattern members. This provides for a mechanism formeasuring each of the pattern members on the body and increasing thenumber of combinations that may be measured for authenticating the key.

In an embodiment, the at least a pair of contacts includes a pluralityof contacts, each of the plurality of contacts being arranged with twoother contacts to electrically couple two pattern members of theplurality of pattern members. This provides for still furthercombinations that may be measured for authenticating the key since eachof the plurality of pattern members may be measured individually, or incombination with one or more other pattern members.

In an embodiment, the body includes a first side and a second side. Afirst plurality of pattern members of the plurality of pattern membersis arranged on the first side and a second plurality of pattern membersof the plurality of pattern members is arranged on the second side. Thisprovides additional area to place more pattern members and furtherincrease the number of combinations used in authenticating the key.

In an embodiment, the body includes a third side and a fourth side. Theplurality of pattern members further includes a third plurality ofpattern members arranged on the third side and a fourth plurality ofpattern member arranged on the fourth side. This provides still furtheradditional area to place more pattern members and further increase thenumber of combinations used in authenticating the key.

In an embodiment, each of the plurality of pattern members has a featurepitch of 200 in a first direction and a second direction. This providesfor increased density of the pattern members while providing space forthe contacts.

In an embodiment, the key further includes a radio frequencyidentification circuit coupled to the body. This provides for asecondary authentication circuit in addition to the pattern members.

In accordance with another embodiment a security system is provided. Thesecurity system including a key having a body with at least one patternmember disposed on the body, the pattern member formed using a directedself-assembly polymer to define a pattern of random feature structuresthereon, the feature structures having a width of less than 100nanometers. A receptacle is provided having an opening sized to receivethe body and at least a pair of probes operably coupled to thereceptacle, the at least a pair of probes being positioned to operablycommunicate with the at least one pattern member to measure a parameter.

In an embodiment, the parameter is a measurement of resistance, voltageor capacitance between the pairs of contacts. This provides forincreasing the number of combinations that may be formed inauthenticating the key.

In an embodiment, the at least a pair of probes are configured totransmit a radio frequency signal and the at least one pattern member isconfigured to reflect the radio frequency signal. This provides for anon-contact means of measuring the parameter.

In accordance with another embodiment, a method is provided. The methodincludes arranging a first directed self-assembly polymer having a firstlength on a substrate. A second directed self-assembly polymer isarranged having a second directed self-assembly polymer having a secondlength on the substrate, an end of the second directed self-assemblypolymer being coupled to an end of the first directed self-assemblypolymer. The first directed self-assembly polymer and the secondself-assembly polymer are solidified on the substrate. The secondself-assembly polymer is removed to define a pattern by the firstdirected self-assembly polymer, the pattern being defined by a pluralityof random feature structures thereon, the feature structures having awidth of less than 100 nanometers. A pattern member is formed bymetalizing the first directed self-assembly polymer. The pattern memberis coupled to a key body. A key parameter of the pattern member ismeasured. The key body is engaged with a receptacle. A measuredparameter of the key body is measured. A security system is disengagedbased the measured parameter being equal to the key parameter.

Additional features and advantages are realized through the techniquesof the present invention. Other embodiments and aspects of the inventionare described in detail herein and are considered a part of the claimedinvention. For a better understanding of the invention with theadvantages and the features, refer to the description and to thedrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The subject matter which is regarded as the invention is particularlypointed out and distinctly claimed in the claims at the conclusion ofthe specification. The forgoing and other features, and advantages ofthe invention are apparent from the following detailed description takenin conjunction with the accompanying drawings in which:

FIG. 1 depicts a perspective view of a pattern member being formed fromdirected self-assembly polymers, in accordance with some embodiments ofthis disclosure;

FIG. 2 depicts a top view of the pattern member of FIG. 1, according tosome embodiments of this disclosure;

FIG. 3 depicts a perspective view of a security key that uses thepattern members of FIG. 1, according to some embodiments of thisdisclosure;

FIG. 4 depicts a perspective view of a security system, according tosome embodiments of this disclosure;

FIG. 5 depicts a partial schematic view partially in section of thesecurity system of FIG. 4, according to some embodiments of thisdisclosure;

FIG. 6 depicts a partial schematic view partially in section of thesecurity system of FIG. 4, according to some embodiments of thisdisclosure;

FIG. 7 depicts a perspective view of a security system, according tosome embodiments of this disclosure;

FIG. 8 depicts a perspective view of a security key, according to someembodiments of this disclosure; and

FIG. 9 depicts a flow diagram of a method for fabricating a security keywith a pattern member, according to some embodiments of this disclosure.

DETAILED DESCRIPTION

Embodiments of the present disclosure provide for a system and methodfor authenticating a security key having authentication features at notvisible using optical metrology. Embodiments of the present disclosureprovide for a system and method of authenticating a security key havingat least one member having a random pattern with nanoscale featuresformed thereon. Still further embodiments provide for a method offabricating a security key with at least one member having a randompattern with nanoscale features formed thereon.

Referring now to FIG. 1 an embodiment is shown of a pattern member 20being formed from directed self-assembly polymers. In an embodiment, thepattern member 20 includes a substrate 22 having a first polymer 24 anda second polymer 26 formed thereon. The substrate 22 may be a planarsurface as shown or a curved surface. However, the surface of thesubstrate 22 is substantially smooth and does not have any guidingpatterns formed thereon. The first polymer 24 has a first length and thesecond polymer 26 has a second length, the first length being differentthan the second length. The polymers are coupled end to end in analternating pattern. The polymers 22, 24 are solidified and the secondpolymer 24 is removed as is known in the art. As a result, the firstpolymer 22 forms a random feature structure 28 on the substrate 22 asshown in FIG. 2. The random feature structure 28 may form valleys andridges similar to a fingerprint. In the exemplary embodiment, apoly(styrene-block-methylmethacrylate) (PS-b-PMMA) polymer may be used.

The random feature structure 28 defines a plurality of lines on thesurface of the substrate 22. In an embodiment, the lines are randomlyoriented and shaped, but have a generally uniform width. In oneembodiment, the width of the line structures and the gaps therebetweenis between are less than 100 nm. In one embodiment, the line structuresand gaps therebetween are less than 20 nm. In an embodiment, the size ofthe line structures and gaps may be predetermined based on the directedself-assembly polymer that is used. It should be appreciated that whilethe pattern members 20 are illustrated as being large in proportion tothe body 32, this is for clarity purposes and the claimed inventionshould not be so limited. In some embodiments, the size of the patternmembers 20 is not visible to an unassisted human eye. In still furtherembodiments, the pattern members 20 are not accessible by opticalmetrology (e.g. less than 100 nm in size).

Once the random feature structure 28 is formed, the pattern member 20may be metalized using nanofabrication techniques as is known in theart. In one embodiment, the random feature structure 28 is used as ablocking mask during the metalizing process resulting in a metallicstructure formed in the gaps that defines a random pattern. As discussedin more detail below, the metalized random pattern may be used as anauthentication feature on a security key. The nanoscale size of thefeatures on the pattern member 20 makes it difficult for an unauthorizedperson to replicate the security key. Due to the nanoscale size of thefeatures, the unauthorized person would need access to the security key,an electron-microscope and a lithography system to replicate the key. Itshould be appreciated that this would make it difficult, time consumingand expensive to create an unauthorized copy of the security key.

Turning now to FIG. 3 and exemplary embodiment of a security key 30 isshown having a plurality of pattern members 20 disposed on at least onesurface. The security key 30 includes a body 32 having a plurality ofsides 34, 36 that are sized and shaped to have the pattern members 20coupled thereto. In the illustrated embodiment, the security key 30 hasa rectangular shape. In an embodiment, the pattern members 20 aredisposed on four sides of the body 32. In another embodiment, thepattern members 20 are disposed on an end 38. It should be appreciatedthat while the illustrated embodiment shows a plurality of patternmembers 20, in other embodiments, the security key 30 has a singlepattern member 20.

The pattern members 20 may be arranged in rows to form an array 44 ofpattern members 20. In one embodiment, a contact pad 40 disposed oneither side of each pattern member 20. The contact pads 40 are connectedto their respective pattern members 20 by a lead 42 that electricallycouples the contact pad with the pattern member 20. Some of the contactpads 40′ may be coupled to multiple pattern members 20. As will bediscussed in more detail herein, the contact pads allow for themeasurement of a parameter, such as resistance, voltage or capacitancebetween two contact pads 40, 40′ that are connected to the same patternmember 20. It should be appreciated that since the pattern structure 28formed on each pattern member 20 is random, the measured parameter willbe different for each pattern member 20. In an embodiment, the contactpads 40, 40′ may be removed and the parameter measured directly from thepattern member 20.

In one embodiment, each side 34, 36 may include a pattern member array44 that is arranged with a pitch between the pattern members in bothdirections (e.g. along the length and across the width) of 200micrometers. For a 4 cm×2 cm body 32, this allows for a 200×100 array oneach side 34, 36. When arranged on all four sides, 80,000 pads areprovided, which when combined with 14 bit analog to digital conversion,a total of 1024⁸⁰⁰⁰⁰ discrete physical pad combinations may be providedfor use in authenticating the security key 30.

It should be appreciated that while embodiments herein describe thesecurity key 30 as being rectangular, this is for exemplary purposes andthe claimed invention should not be so limited. In other embodiments,the body 30 may have other shapes, such as cylindrical for example.Further, while embodiments herein illustrate the pattern members 20 asbeing connected by leads 42 and contact pads 40 on a side, this is forexemplary purposes and in other embodiments, the leads 42 may extendfrom one side to an adjacent side.

Referring now to FIG. 4, an embodiment of a security system 50 is shownthat uses the security key 30. The security system 50 includes areceptacle 52 having an opening 54 therein. The opening 54 is sized andshaped to receive the security key 30. The receptacle 52 further includeat least one probe 56 that is arranged and configured to operablycommunicate with the contact pads 40 when the security key 30 isinserted into the opening 54. In an embodiment, the receptacle 52includes an array 58 of probes 56, where each probe 56 is arranged tooperably communicate with one of the contact pads 40.

The probes 56 are coupled transmit signals to a controller 60. Thecontroller 60 may include a processor and memory for receiving thesignal and providing authentication of the security key 30. Controller60 is capable of converting the analog voltage or current level providedby probes 56 into a digital signal indicative of the parameter measuredon the contact pads 40, 40′. Alternatively, probes 56 may be configuredto provide a digital signal to controller 60, or an analog-to-digital(A/D) converter (not shown) maybe coupled between probes 56 andcontroller 60 to convert the analog signal provided by probes 56 into adigital signal for processing by controller 60. Controller 60 uses thedigital signals as an input to various processes such as a lock system62. The digital signals may represent an authentication of the securitykey 30 that enables the lock system 62 to disengage and allow the useraccess. The digital signals may also represent a failed authenticationin the form of an alarm signal.

Controller 60 is operably coupled with one or more components ofsecurity system 50 by data transmission media 64. Data transmissionmedia 64 includes, but is not limited to, twisted pair wiring, coaxialcable, and fiber optic cable. Data transmission media 64 also includes,but is not limited to, wireless, radio and infrared signal transmissionsystems. Controller 60 is configured to provide operating signals tothese components and to receive data from these components via datatransmission media 64.

In general, controller 60 accepts data from probes 56, is given certaininstructions for the purpose of comparing the data from probes 56 topredetermined operational parameters, such as authentication values forsecurity keys. Controller 60 provides operating signals to the lockingsystem 62. The controller 60 compares the operational parameters topredetermined variances (e.g. resistance, capacitance, voltage) and ifthe predetermined variance matches the measured parameter, generates asignal that may be used to change the state of a system component, suchas allow disengagement of the lock system 62 or trigger an alarm.

In addition to being coupled to one or more components within securitysystem 50, controller 60 may also be coupled to external computernetworks such as a local area network (LAN) and the Internet. The LANinterconnects one or more remote computers, which are configured tocommunicate with controller 60 using a well-known computercommunications protocol such as TCP/IP (Transmission ControlProtocol/Internet(̂) Protocol), RS-232, ModBus, and the like. Additionalsecurity systems 50 may also be connected to the LAN with thecontrollers 60 in each of these security systems 50 being configured tosend and receive data to and from remote computers and other securitysystems 50. The LAN may also be connected to the Internet. Thisconnection allows controller 60 to communicate with one or more remotecomputers connected to the Internet.

In an embodiment, the controller 60 includes a processor coupled to arandom access memory (RAM) device, a non-volatile memory (NVM) device, aread-only memory (ROM) device, one or more input/output (I/O)controllers. In one embodiment, the controller 60 may include a LANinterface device.

I/O controllers are coupled to the media 64 to receive signals fromprobes 56, and alternatively to a user interface. I/O controllers mayalso be coupled to analog-to-digital (A/D) converters, which receiveanalog data signals from probes 56.

The ROM device stores an application code, e.g., main functionalityfirmware, including initializing parameters, and boot code, for theprocessor. Application code also includes program instructions forcausing processor to execute any security system 50 operation controlmethods, including authentication of security keys 30 and generation ofalarms. The NVM device is any form of non-volatile memory such as anEPROM (Erasable Programmable Read Only Memory) chip, a disk drive, orthe like. Stored in the NVM device are various operational parametersfor the application code. The various operational parameters can beinput to NVM device either locally, using a keypad or remote computer,or remotely via the Internet. It will be recognized that applicationcode can be stored in NVM device rather than ROM device.

Controller 60 includes operation control methods embodied in applicationcode. These methods are embodied in computer instructions written to beexecuted by processor, typically in the form of software. The softwarecan be encoded in any language, including, but not limited to, assemblylanguage, VHDL (Verilog Hardware Description Language), VHSIC HDL (VeryHigh Speed IC Hardware Description Language), Fortran (formulatranslation), C, C++, Visual C++, Java, ALGOL (algorithmic language),BASIC (beginners all-purpose symbolic instruction code), visual BASIC,ActiveX, HTML (HyperText Markup Language), and any combination orderivative of at least one of the foregoing. Additionally, an operatorcan use an existing software application such as a spreadsheet ordatabase and correlate various cells with the variables enumerated inthe algorithms. Furthermore, the software can be independent of othersoftware or dependent upon other software, such as in the form ofintegrated software.

It should be appreciated that while controller 60 is illustrated asbeing a single component, in other embodiments the methods describedherein may be performed by multiple computing devices, by remotelydistributed computing devices, or by computing devices arranged in adistributed or cloud computing environment. In other embodiments, thecontroller 60 may communicate with a remotely located authenticationserver or node that stores the authentication parameters. The controller60 may communicate with the remotely located computing devices or nodesvia the LAN, the Internet, or a cloud network for example. It shouldfurther be appreciated that while embodiments herein describe thecontroller 60 as having a processor, the controller 60 may also beembodied in the form of an analog circuit with the authenticationparameters stored therein.

In order for the probes 56 to transmit a signal to the controller 60,the probes 56 need to operably communicate with the security key 30 whenthe security key 30 is inserted into the opening 54. Referring now toFIG. 5, an embodiment is illustrated where an electrical parameter, suchas resistance, capacitance or voltage potential is measured. In thisembodiment, the probes 56 are positioned along an inner surface of theopening 54 and positioned to engage the contact pads 40, 40′. When thesecurity key 30 is inserted, the each probe 56 aligns with and contactswith one of the contact pads 40, 40′. Once the electrical connection ismade, the probe 56 can measure the desired parameter and transmit asignal to the controller 60. It should be appreciated that in thisembodiment, the number of probes 56 in the probe arrays 58 is the sameas the number of contact pads 40 on the security key 30.

Referring now to FIG. 6, another embodiment is shown for measuring aparameter of the pattern members 20. In this embodiment, the probes 56are positioned to be adjacent the pattern members 20 when the securitykey 30 is inserted into the opening 54. The probe 56 includes atransmitter 66 that is configured to transmit an electromagnetic signal68 in a direction towards the pattern member 20. The pattern member 20reflects a return signal 70 that is received by a receiver 72. In anembodiment, the return signal 70 is modulated by the pattern member 20and is therefore different than the electromagnetic signal 68. It shouldbe appreciated that each metalized pattern member 20 modulates theelectromagnetic signal 68 differently than the others based at least inpart on random pattern structure of the pattern member 20. Therefore,each return signal 70 represents a signature for the pattern member 20that may be used as the parameter to authenticate the security key 30.In an embodiment, the electromagnetic signal 68 is a near fieldcommunication signal, having a wavelength of about 13.56 MHz. In anotherembodiment, the electromagnetic signal was a wavelength in the Teraherzband. In embodiments, the receiver 72 may be a carbon nanotube orgraphene-based nano-antenna that is configured to decode an amplitude orfrequency of the modulated return signal 70.

In still further embodiments, there is a single probe 56 associated witheach side 34, 36 of the security key. The probe 56 emits a singleelectromagnetic signal 68 and the measured parameter is a sum of thereturn signals 70 reflected from the pattern elements 20.

Referring now to FIG. 7, another embodiment is shown for a securitysystem 80 that incorporates the pattern members 20 with a radiofrequency responsive circuit. In this embodiment, the security key 30includes a radio frequency identification (RFID) or near fieldcommunication (NFC) circuit 82. The RFID/NFC circuit 82 is configured toallow communication with an external initiator (e.g. the RFID/NFC readercircuit 84) using a predetermined protocol, such as ISO/IEC 18000-3 forexample, in response to an input electromagnetic signal (e.g. about120-150 kHz or 13.56 MHz). In the exemplary embodiment, the RFID/NFCcircuit 82 is a passive circuit that uses magnetic induction as anenergy source. The RFID/NFC circuit 82 modulates the existing inputelectromagnetic signal to transfer data. The passive RFID/NFC circuit 82may sometimes be colloquially referred to as a “tag.” In one embodiment,the RFID/NFC circuit 82 may be an active circuit having its own energysource, such as a battery for example. The RFID/NFC circuit 82 isactivated when within range of the reader circuit 84. In the exemplaryembodiment, the range of the reader circuit 84 is less than 1 meter. Inanother embodiment, the range of the reader circuit 84 is less than 10centimeters. The RFID/NFC circuit 82 may be located on or adjacent tothe end 38.

The receptacle 52 includes the RFID/NFC reader circuit 84 that transmitsan electromagnetic signal and receives a return signal from the RFID/NFCcircuit 82. The RFID/NFC reader circuit 84 may include an antenna 86that is coupled to the receptacle 52, such as at an end 88 locatedopposite the entrance to the opening 54. In an embodiment, the RFID/NFCreader circuit 84 and antenna 86 are configured to activate the RFID/NFCcircuit 82 when the security key 30 is inserted within the opening 54(e.g. range of less than 4 cm). The probe array 58 is coupled forcommunication to a probe reader 90. Both the probe reader 90 and theRFID/NFC reader circuit 84 are coupled to the controller 60. It shouldbe appreciated that while the illustrated embodiment shows the probereader 90 and RFID/NFC reader circuit 84 as being separate or discretecomponents from the controller 60, this is for exemplary purposes and inother embodiments, either of the RFID/NFC reader circuit 84 and theprobe reader 90 may be integrated into the controller 60.

In the exemplary embodiment, the RFID/NFC circuit 82 includesidentification data, which is transferred to the RFID/NFC reader circuit84 when the security key 30 is inserted into the opening 54. Thisidentification data provides a secondary authentication means for thesecurity key 30. In an embodiment, the controller 60 may compare theidentification data with the measured parameter from the probe array 58and determine if there is a correspondence. In other words, thecontroller 60 determines whether the identification data transmittedfrom the RFID/NFC circuit 82 is the identification data associated withthe pattern member arrays 44 measured by the probes 56. When there is acorrespondence, the security key 30 is authenticated and the controller60 transmits a signal to the lock system 62. In an embodiment, theidentification data is encrypted on the RFID/NFC circuit 82 and isdecrypted by the controller 60.

Referring now to FIG. 8, an embodiment is shown that increases thedifficulty of creating an unauthorized duplicate of the security key 30.In this embodiment, the parameter for each of the pattern members 20 maybe individually determined such that some of the pattern members 20 maybe measured by the probe array 58 while others may remain unmeasured.Since an unauthorized person attempting to duplicate the security keywill not know which pattern members 20 are being measured by thecontroller 60, it may be more difficult to replicate the key. Further,in some embodiments, the security key 30 may be used with multiplereceptacles 52. For example, multiple keys may be authorized to open abank vault, but then each individual key is only authorized to open asubset (or an individual) of the safety deposit boxes. Thus the securitykeys 30 for different users may share a common subset of the patternmember array. For example, each of the security keys 30 may haveidentical pattern members “A”, “B”, “K”, “L”, “F”, “E”, “0”, “P” thatauthenticates with a receptacle associated with a bank vault or a lobbydoor for example. Since each of the security keys 30 has a common subsetof pattern members 20, all of these security keys 30 will authenticateat this receptacle. The remainder of the pattern elements (e.g. “C”,“D”, “Q”, “R”) may then be used to authenticate other secured accessareas, such as safety deposit boxes or computer terminals for example.

Referring now to FIG. 9, a method 100 is shown for fabricating asecurity key 30 having nanoscale authentication features. The method 100starts in block 102 where the directed self-assembly polymers arearranged on a substrate. In an embodiment, two directed self-assemblypolymers each have a different length and are positioned end to end inan alternating arrangement. In some embodiments, more than two directedself-assembly polymers are used. The method 100 then proceeds to block104 where the polymers are polymerized to form a solid. The method 100then proceeds to block 106 where one of the two polymers is removed todefine a random pattern formed by the remaining polymer on thesubstrate. In an embodiment, the directed self-assembly polymers arechosen to have a predetermined feature size when solidified. Next, inblock 108, the pattern is metalized to form the pattern member having arandom pattern structure thereon. In an embodiment, the polymer thatremained on the substrate is used as a blocking mask during themetalizing process.

The method 100 then proceeds to block 110 where a plurality of patternmembers are formed by repeating blocks 102-108 until the desired numberof pattern members have been fabricated. The formed pattern members areapplied to the security key body along with the contact pads and leads.The patterns members and contact pad are electrically connected in block112. The parameters for each of the pattern members are next measured inblock 114 so that the key may be authenticated. Finally, the measuredparameters are stored (such as in memory associated with the controller)in block 116.

It should be appreciated that while embodiments herein referred to aparticular secured area or thing, such as a bank vault, safety depositbox or door for example, this is for exemplary purposes and the claimedinvention should not be so limited. Embodiments of the security key andsecurity system may be used in any application where authentication maybe desired. For example, the security system may be used with a computersystem where the receptacle is coupled to a computer terminal, such asto authorize a financial transaction. In still other embodiments, thesecurity system may be used to initiate processes rather than preventaccess, such as a manufacturing process where the workers need to exitthe area before the process is initiated. The key may be used toauthenticate that the workers have exited the area and thus allow theprocess to start.

Technical effects and benefits of some embodiments include theauthentication of a key by measuring a parameter associated with patternelements having a nanoscale random pattern formed thereon.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiments were chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Java, Smalltalk, C++ or the like,and conventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

1. A method comprising: arranging a first directed self-assembly polymer having a first length and a second directed self-assembly polymer having a second length on a first substrate, the first directed self-assembly polymer and second directed self-assembly polymer being positioned in an alternating arrangement, the second length being different than the first length; polymerizing the first directed self-assembly polymer and the second directed self-assembly polymer to form a first solid on the first substrate; removing one of the first directed self-assembly polymer or the second directed self-assembly polymer to define a first random pattern by the other of the first directed self-assembly polymer or second directed self-assembly polymer, the first random pattern being defined by a plurality of random feature structures thereon, the feature structures having a first width of less than 100 nanometers; forming a first pattern member by metalizing the other of the first directed self-assembly polymer or second directed self-assembly polymer; coupling the first pattern member to a key body; measuring a first key parameter of the first pattern member; and storing the first key parameter in memory.
 2. The method of claim 1, wherein the measuring the first key parameter includes engaging probes to contacts, the contacts being electrically coupled to the first pattern member.
 3. The method of claim 1, wherein at least one of the first directed self-assembly polymer and the second directed self-assembly polymer is formed by a poly(styrene-block-methylmethacrylate) (PS-b-PMMA) polymer.
 4. A method 1 comprising: arranging a first directed self-assembly polymer having a first length and a second directed self-assembly polymer having a second length on a first substrate, the first directed self-assembly polymer and second directed self-assembly polymer being positioned in an alternating arrangement, the second length being different than the first length; polymerizing the first directed self-assembly polymer and the second directed self-assembly polymer to form a first solid on the first substrate; removing one of the first directed self-assembly polymer or the second directed self-assembly polymer to define a first random pattern by the other of the first directed self-assembly polymer or second directed self-assembly polymer, the first random pattern being defined by a plurality of random feature structures thereon, the feature structures having a first width of less than 100 nanometers; forming a first pattern member by metalizing the other of the first directed self-assembly polymer or second directed self-assembly polymer; coupling the first pattern member to a key body; measuring a first key parameter of the first pattern member; storing the first key parameter in memory; and wherein the feature structures having the first width of less than 20 nanometers.
 5. The method of claim 1, further comprising using the other of the first directed self-assembly polymer or second directed self-assembly polymer as a blocking mask during the forming the first pattern member by metalizing.
 6. The method of claim 1, further comprising arranging a third directed self-assembly polymer having a third length and a fourth directed self-assembly polymer having a fourth length on a second substrate, the third directed self-assembly polymer and fourth directed self-assembly polymer being positioned in an alternating arrangement, the fourth length being different than the third length; polymerizing the third directed self-assembly polymer and the fourth directed self-assembly polymer to form a second solid on the second substrate; removing one of the third directed self-assembly polymer or the fourth directed self-assembly polymer to define a second random pattern by the other of the third directed self-assembly polymer or fourth directed self-assembly polymer, the second random pattern being different than the first random pattern, the second random pattern being defined by a plurality of second random feature structures thereon, the second feature structures having a second width of less than 100 nanometers; forming a second pattern member by metalizing the other of the third directed self-assembly polymer or fourth directed self-assembly polymer; coupling the second pattern member to the key body; measuring a second key parameter of the second pattern member; and storing the second key parameter in memory.
 7. The method of claim 6 wherein the first pattern member and the second pattern member are coupled to a first side of the key body.
 8. The method of claim 7, further comprising electrically coupling the first pattern member to the second pattern member.
 9. The method of claim 8, wherein at least one of the first key parameter and second key parameter is a measurement of resistance, voltage or capacitance between the first pattern member and second pattern member.
 10. The method of claim 7 wherein the first pattern member and second pattern member by a pitch of 200 micrometers.
 11. The method of claim 6, wherein the first pattern member is coupled to a first side of the key body and the second pattern member is coupled to a second side of the key body.
 12. The method of claim 6 wherein the first directed self-assembly polymer, the second directed self-assembly polymer, the third directed self-assembly polymer and the fourth directed self-assembly polymer are made from a poly(styrene-block-methylmethacrylate) (PS-b-PMMA) polymer.
 13. The method of claim 1 wherein the first key parameter is a measurement of resistance, voltage or capacitance.
 14. The method of claim 1, further comprising forming a security key from the key body. 