Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and structure for implementing secure multichip modules for encryption applications

A chip and lattice structure technology, applied in the direction of safety communication devices, circuit safety components, computer safety devices, etc., can solve the problems of cumbersome design, low interconnection height, short circuit or open circuit, etc.

Active Publication Date: 2009-06-17
INT BUSINESS MASCH CORP
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Unfortunately, existing Multi-Chip Modules (MCMs) that meet Level 4 security requirements are difficult to implement and cumbersome to design, including, for example, potted fragile mesh card structures
Additionally, this design provides limited capacity for desired electromagnetic (EM) shielding
Yet another difficulty comes from changing an existing cryptographic module from an organic substrate material to a ceramic-based material, as ceramic materials exhibit certain interconnect issues, such as nearest-neighbor missing ball grid arrays due to debonding of solder balls
Furthermore, a fully exfoliated structure will have a lower interconnect height, which in turn will result in a larger percentage variation between interconnect heights across the device
The dropout height of the final interconnect can also cause a short or open

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and structure for implementing secure multichip modules for encryption applications
  • Method and structure for implementing secure multichip modules for encryption applications
  • Method and structure for implementing secure multichip modules for encryption applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] A method and structure for implementing a secure multi-chip module (MCM) for security level 4 cryptographic applications based on, for example, the FIPS 140-1 standard is disclosed herein. Briefly, a ceramic based chip security module assembly has a chip carrier to which one or more integrated circuit chips are attached, in addition to a cap layer for preventing and blocking access to the IC chip. At the same time, a protective conductive grid is provided for the ceramic chip carrier and the cap layer, and detour safety lines are formed in the conductive grid in the x-direction, y-direction and z-direction. In addition to providing intrusion detection (via monitoring methods such as dielectric impedance shift and resistance shift detection), these security lines are also configured to provide electromagnetic shielding.

[0028] Referring first to FIG. 1 , there is shown a schematic cross-sectional view of an MCM (or SCM) security module 100 configured in accordance with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A tamper-resistant integrated circuit (IC) module comprising a ceramic-based chip carrier, one or more integrated circuit chips attached to the chip carrier, and a cap attached to the chip carrier covering the one or more integrated circuit chips cover structure. A conductive grid structure is formed in the chip carrier and the cap structure, the conductive structure has a plurality of detours arranged in x-direction, y-direction and z-direction. The conductive grid structure is configured to detect attempts to hack into the IC module.

Description

technical field [0001] The present invention relates generally to integrated circuit devices and packaging methods, and more particularly to methods and structures for implementing secure multi-chip modules (MCMs) for cryptographic applications. Background technique [0002] FIPS (Federal Information Processing Standard) 140-1 is a US government standard for implementing cryptographic modules, hardware or software that encrypts and decrypts data or performs other cryptographic operations such as creating or verifying digital signatures. The FIPS 140-1 standard was created by NIST (National Institute of Standards and Technology) and specifies requirements for the proper design and implementation of products that perform encryption. [0003] In particular, FIPS 140-1 specifies requirements that cryptographic modules in security systems used to protect unclassified information in computer and telecommunications systems, including voice systems, must meet. The standard provides...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H01L25/00H01L23/02H01L23/552H01L21/50G06F21/00G06F12/14G06F1/00H04L9/00
CPCH01L23/04H05K1/0275H05K2201/10151G06K19/07381H05K1/144H01L2924/3011H01L23/10H05K2201/09263H01L2924/01079H01L2924/09701H01L23/055H01L2924/15192H01L25/0655H05K1/0306H01L23/576H01L2224/16227H01L2224/16225H01L23/552
Inventor 米克塔·G·法鲁克本杰明·V·法萨诺贾森·L·弗兰克尔哈维·C·哈梅尔休尔·D·卡达基阿戴维·C·朗弗兰克·L·庞佩奥萨迪普塔·K·雷
Owner INT BUSINESS MASCH CORP