Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted reconfigurable device and using method thereof

A device, trusted technology, applied in the direction of instrument, internal/peripheral computer component protection, electrical digital data processing, etc., can solve the problem of not providing hardware quota data and firmware code tampering, etc.

Active Publication Date: 2010-11-24
BEIJING UNIV OF TECH
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, we encountered how to reduce the risk of FPGA hardware configuration information and microprocessor operating belt being tampered with without affecting product performance, and how to quickly restore FPGA devices to normal working conditions when data has been tampered with. The problem
At present, the two major FPGA suppliers, Xilinx and Altera, have released their respective solutions for intellectual property protection of FPGA hardware configuration data and IP cores, but have not yet provided a design solution for how to prevent hardware quota data and firmware codes from being tampered with.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted reconfigurable device and using method thereof
  • Trusted reconfigurable device and using method thereof
  • Trusted reconfigurable device and using method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In the embodiments of the present invention, a Field Programmable Gate Array (Field Programmable Gate Array, FPGA) is used as an example to illustrate the reconfigurable device. Because the FPGA device is a complete chip, since the internal transformation of the chip cannot be realized, the following approximate implementation method is used for illustration.

[0055] like image 3 Shown:

[0056] The encryption algorithm engine selects SHA1 algorithm, ECC algorithm and RSA algorithm.

[0057] The controller selects an 8-bit internal microcontroller with Flash. Internal Flash is used to store root key and session key. Both the root key and the session key are 2048-bit keys.

[0058] The control interface, the configuration interface and the inspection interface respectively select 8-bit wide input and output pins on the original FPGA chip. (A total of 24 bits) The 24-bit input and output interfaces of the single-chip microcomputer are directly connected to the cont...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, and particularly relates to a trusted reconfigurable device and a using method thereof. As the characteristic of reconfigurability of the reconfigurable device is increasingly widely applied in engineering development, malicious attackers in the complex application environments of a network and the like also can utilize the characteristic of reconfigurability of the reconfigurable device to fulfill the aim of destructing or stealing important information and engineering design in the reconfigurable device by using the illegal means of falsifying and the like. In the invention, a method is provided for the transmission of configuration information and important data by arranging a controller, a cryptographic algorithm engine and the like in the reconfigurable device and establishing a trusted channel between the reconfigurable device and master control equipment by using the means of random numbers, a cryptographic algorithm, mutual authentication and the like; an integrity checking function is realized in a debugging interface module and a configuration module of the reconfigurable device; and the trusted reconfigurable device and the using method are provided for users by the trusted channel and an integrity checking unit.

Description

technical field [0001] The invention belongs to the field of computer trustworthiness. Background technique [0002] At present, the technical reasons for information security accidents are mainly the simplification of existing computer software and hardware structures, which leads to illegal use of resources. In order to solve hidden dangers of information security, trusted computing needs to start with improving the terminal's own protection capabilities and solve information security problems from the source. For example: hardware devices (especially SOC chips) are the basis of the entire computing system. A seemingly ordinary hardware device may contain logic bombs and sniffers. It is unknown what information it is collecting or when it will explode. [0003] In the network tax controller project that the author participated in, the network tax controller is mainly used to monitor the cash register terminal, record the communication records between the cash register te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/71
Inventor 沈昌祥毛军捷李健刘毅
Owner BEIJING UNIV OF TECH