Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information processing unit

一种信息处理装置、生成装置的技术,应用在安全通信装置、电数字数据处理、用编码识别卡或信贷卡片的启动等方向,能够解决相关性低、分析攻击困难等问题,达到提高攻击、提高抵抗的效果

Inactive Publication Date: 2007-12-19
RENESAS ELECTRONICS CORP
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since by using this method, the correlation between the power consumption during data transmission and the transmission data can be low or non-existent, the power consumption analysis attack becomes significantly difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing unit
  • Information processing unit
  • Information processing unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0130] First, an embodiment of mapping a physical address according to (Formula 1) and its operation will be described using FIGS. 4, 5, and 6. FIG.

[0131] First, show the simplest M=2 m An embodiment of the occasion of the form of (2 to the m power).

[0132] The embodiment of the present invention shown in FIG. 4 is composed of the following parts. That is to say, its structure includes a buffer 401 for program counting, a random number generator 402, a buffer 403 for random numbers, an adder 404, and storage 2 m - Buffer (PC) 405 of I=M-1 (m 1s are arranged in parallel in binary representation), circuit 406 for calculating logical product (logical AND), physical address buffer 407, and whether the position of the program counter is determined to be in the specified area The decision circuit 408 , the selector 409 , the zero buffer 410 , the start address buffer 411 , the subtractor 412 and the end address buffer 413 . Here, the value 0 is stored in the zero buffer. Si...

Embodiment 2

[0144] The following describes an embodiment in which the simplest scrambling effect in the correspondence between physical addresses and logical addresses is high. Assume that the number of bits of the address is n. Usually, memory differs by the high order bits of the address. In this embodiment, for the sake of simplicity, it is assumed that the entire RAM area is an area in which the most significant bit is 1. That is, the RAM area has 2 n-1 Bit-sized regions.

[0145] This embodiment consists of the following parts. That is, a buffer 701 for program counting, a random number generator 702, a buffer 703 for random numbers, a judging circuit 704 for judging whether the position of the program counter is in a specified area, a selector 705, a zero buffer 706, and a circuit for calculating an exclusive OR value circuit 707 and physical address buffer 708 . Here, the value 0 is stored in the zero buffer. Since this is a fixed value, it doesn't need to be a register, for ...

Embodiment 3

[0150] In the present invention, security can be further improved by using a combination of configuration data and a technique of changing the address to a certain value. For example, it can be considered that by applying the method of the present invention to the area that becomes the target of DPA attack in RAM, for the part that becomes the target of the attack method that directly observes and extracts internal information without using statistical methods, the data is allocated so that the address As long as the change is fixed, a wider range of internal data can be safely processed, and security can be improved.

[0151] This embodiment, for example, is as follows.

[0152] Currently, the address of the RAM area is from C000 to CFFF in hexadecimal notation. Next, in the extended example of M shown in Embodiment 1 above, an information processing apparatus applied to the area from C900 to CFFF will be considered. Under this condition, consider the following procedure. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An object of the present invention is to a provide tamper resistant information processing unit that is used as an IC card with a high level of security. To achieve the above-mentioned object, the information unit of the present invention comprises: a program container part for storing a program; a memory for storing data; an arithmetic unit for performing specified processing according to the program; a data bus for connecting the memory to the arithmetic unit; and a transform function for transforming a logical address and a physical address of the memory, said logical address being used for arithmetic operation by the arithmetic unit, said physical address being set at random corresponding to the logical address at each arithmetic operation or every time the information processing unit is started up.

Description

technical field [0001] The present invention relates to a tamper-resistant information processing device with high security, and particularly relates to an extremely effective technology applicable to IC cards. [0002] The present invention relates to an anti-interference information processing device capable of preventing reading and analysis of processing information generated by power consumption analysis and hardware inspection in the information processing device. In addition, it also relates to a fault-tolerant anti-interference information processing device that can detect data changes and tampering caused by attacks during data recording and reading, or can automatically restore data changes and tampering. In particular, it relates to a monolithically integrated information processing device typified by an IC card (smart card) in which such a function is essential. Background technique [0003] The IC card is a device for storing personal information that cannot be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/00G06K19/073H04L9/00G07F7/10G06F12/02G06F12/04G06F12/14
CPCH04L2209/127H04L9/003G06F12/1408H04L9/004H04L9/0612
Inventor 神永正博渡边高志远藤隆
Owner RENESAS ELECTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products