The Future of Device Trust is Hardware-Born

A step-by-step view of CoreBond pairing and authentication.

CoreBond pairing diagram
  1. The device exposes a physically unclonable function that yields a unique response.
  2. At first pairing, the owner and device connect with a wire and both generate real random entropy.
  3. Both sides derive the same verification value from the PUF response and the entropy.
  4. The values are discarded. Nothing is stored and nothing secret is sent on the network.
  5. Later, both sides can regenerate the same value on demand for local verification.