Due to JTAG's high internal accessibility, security is needed so that only authorized users can access it. In this paper, we propose ways to improve the existing Challenge–Response authentication method using PUF chip and ECDSA asymmetric key algorithm. Afterwards, the merits and demerits of this are analyzed and the direction of future research is described.