Device for defending invasive attack

An intrusive, signal technology, applied in the direction of measuring devices, instruments, measuring electricity, etc., can solve the problem of loss of protection, and achieve the effect of improving safety and preventing leakage

Inactive Publication Date: 2012-05-16
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The traditional method of defending against intrusive attacks is that the signal (data) at the transmitter of the sensor is a fixed value or a signal (data) that changes periodically. Once the signal is known by the attacker and simulated on the metal wire, it will be loss of protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device for defending invasive attack
  • Device for defending invasive attack
  • Device for defending invasive attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] see figure 1 As shown, in an embodiment, the device for defending against invasive attacks includes: one or more metal wires 140 , a random source 100 , a comparator 130 , a sensor 170 , a controller 150 , and an alarm flag 160 .

[0019] The metal wire 140 covers the protected circuit, one end of the metal wire 140 is connected to the signal transmitting end 110 of the sensor 170 , and the other end is connected to the signal receiving end 120 of the sensor 170 .

[0020] The controller 150 controls the sensor 170 to periodically detect the connectivity of the metal wire 140 , and when it is found that the connectivity of the metal wire 140 is abnormal, the alarm flag 160 becomes valid.

[0021] see figure 2 As shown, a detection cycle is divided into two phases - the signal establishment phase and the signal detection phase.

[0022] In the signal establishment stage, the controller 150 obtains a random signal (random number) from the random source 100, and uses th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device for defending invasive attack. The device comprises one or more sensors, one or more metal wires, a comparator and a controller, wherein the signal transmitting end of each sensor is used for transmitting a signal, and the signal receiving end of each sensor is used for detecting the integrity of the signal; the metal wires are covered above a protected circuit and used for connecting the signal transmitting ends and the signal receiving ends of the sensors together; the input end of the comparator is respectively connected with the signal transmitting ends and the signal receiving ends of the sensors and used for comparing the signals of the signal transmitting ends and the signal receiving ends, and the output end of the comparator is connected with the data input end of an alarm mark; and the controller is used for controlling the signal update of the signal transmitting ends of the sensors, controlling the comparator to periodically detect the connectivity of the metal wires and enabling the alarm mark to be valid when the connectivity of the metal wires is abnormal. Through the device, the internal signals of an integrated circuit (IC) chip can be effectively prevented from being detected by the invasive attack, the security of user data is protected, and the security strength of the IC chip is improved.

Description

technical field [0001] The invention relates to the field of IC chip security, in particular to a device for defending against intrusive attacks, how to detect intrusive attacks, issue an alarm in time, and prompt the system to process. Background technique [0002] With the continuous expansion of the application range of IC (Integrated Circuit) chips, the security requirements for IC chips are also becoming higher and higher. At the same time, with the advancement of science and technology, IC chips that were previously thought to be highly integrated and highly secure are increasingly vulnerable to various attacks, and effective technologies must be developed to combat various possible threats. [0003] Among the various threats, intrusive attacks are a technique with a high success rate. Intrusive attacks refer to physically irreversible changes to the structure of IC chips by means of etching, laser, FIB (focused ion beam), etc., so that internal signals can be detecte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/02
Inventor 何玉明
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products