Unlock instant, AI-driven research and patent intelligence for your innovation.

General processor supporting reconfigurable safety design

A general-purpose processor and security processing technology, which is applied in the direction of electrical digital data processing, computer security devices, general-purpose stored program computers, etc., can solve the problems of embedding security modules, information insecurity, security modules or security chips being difficult to be compatible with each other, etc.

Active Publication Date: 2012-09-26
北京多思技术服务有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The problem is that, on the one hand, the TPM / TCM chip exists on the motherboard and outside the CPU, which causes design problems such as wiring on the motherboard, and also causes the bus to be exposed, causing information insecurity electromagnetically.
On the other hand, due to the different security standards (protocols, algorithms, etc.) between countries, the security modules or security chips between countries are difficult to be compatible with each other, making it difficult to embed security modules in general-purpose CPUs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General processor supporting reconfigurable safety design
  • General processor supporting reconfigurable safety design
  • General processor supporting reconfigurable safety design

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Those skilled in the art will understand that the following specific descriptions are only exemplary, and are intended to more clearly illustrate the general concept, idea, and structure of the present invention, rather than limiting the claims.

[0030] figure 1 A block diagram of a general-purpose processor supporting a reconfigurable security design according to the present invention is shown. According to one embodiment of the present invention, the general purpose processor includes a security core and a processing core. The secure kernel is used for secure processing. The security processing includes at least, but not limited to, cryptographic processing, processing related to security protocols, and security metrics. Correspondingly, the security kernel may include one or more of a cryptographic processing kernel, a secure COS kernel, and a security metrics kernel for cryptographic processing, security protocol-related processing, and security metrics, respecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a general processor, which is characterized by comprising a security kernel capable of carrying out safety processing, wherein at least one part of the security kernel is reconfigurable.

Description

technical field [0001] The invention relates to a general processor, in particular to a general processor supporting reconfigurable safety design. Background technique [0002] The rapid development and wide application of information technology, while bringing great convenience to people, also faces the problem of information security. Many measures have been taken to solve the problem of information security. Among them, encrypting information is an effective measure. [0003] There are two traditional data encryption methods, one is the software encryption method, that is, the encryption / decryption algorithm is implemented by software, and the data encryption / decryption operation is completed on a general-purpose computer; the other is the hardware encryption method, that is, a certain encryption method is completely implemented by hardware An encryption / decryption algorithm is manufactured, and an ASIC chip for a certain encryption / decryption algorithm is manufactured,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F15/76G06F21/00G06F21/45
Inventor 刘大力曹春春
Owner 北京多思技术服务有限公司