Chip attack protection
A chip and chip protection technology, applied in hardware monitoring, preventing unauthorized use of memory, instruments, etc., can solve problems such as incompatibility of processing technology and difficulty in manufacturing back shields
Inactive Publication Date: 2010-12-01
ACANO UK
View PDF2 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
In addition, the via holes generally need to be very deep into the chip 10, thereby making the manufacture of the back shield very difficult.
Additionally, the fabrication of vias is generally incompatible with current processing technologies
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
A broadcast-centric cellular communication system improves broadcast channel performance by exploiting the benefits of macro-diversity in a cellular communication system having a plurality of base stations that transmit signals within a plurality of associated cells. The system constructs an identical paging signal at the plurality of base stations, and controls the base stations to simultaneously transmit the identical paging signal. A mobile station camps on a paging channel that is common to the plurality of base stations, and listens to paging messages being simultaneously broadcast by the plurality of base stations. The mobile station selects a base station having a suitable signal quality, and transmits to the selected base station, a response to a paging message addressed to the mobile station.
Description
Chip attack protection technical field The present invention relates to protecting chips from attacks, and more particularly to protecting chips from attacks through the chip substrate. Background technique By way of introduction, a secure chip is vulnerable to attacks on the physical structure of the chip. In particular, attackers seek to modify circuitry to obtain information stored in the chip and / or to alter the chip's operating characteristics to those in the attacker's favor. The attack is typically in the form of probing, and has recently been modified for focused ion beams (FIB). Ability to interrogate interconnect traces and other circuit elements, or inject signals into them. Circuits can be rerouted, damaged or scrapped. There are many possible attacks depending on physical modification. The most common defense against attacks is the use of shields. Passive shielding is typically effective at preventing observation of circuits and making attacks more time...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Patents(China)
IPC IPC(8): G08B13/00H04L9/32H01L29/00G06F11/30G06F12/14H01L23/02
CPCH01L2924/14H01L2924/00014H01L2224/16225H01L2224/48091H01L2224/48227H01L2224/48463H01L2224/48471H01L2224/73257H01L2224/4554
Inventor J·沃克I·曼廷
Owner ACANO UK
