Information safety coprocessor for performing relevant operation by using specific instruction set

A coprocessor and information security technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve the problems of complex application, poor performance, cost and ease of use, and the inability of a single-function coprocessor to meet requirements. , to achieve the effect of flexible function and low cost

Inactive Publication Date: 2012-06-27
SOLOMON SYSTECH SHENZHEN LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, advanced security schemes often require the use of several cryptographic algorithms. Therefore, a coprocessor with a single function is not suitable for implementing complex schemes. Moreover, applications on embedded systems are becoming more and more complex (such as smart phones), and rich Applications and multitasking also make it impossible for a single-function coprocessor to suffice
There is also another complex coprocessor that has an independent microprocessor and a complete secure execution environment, which has advantages in security and flexibility, but is not good in performance, cost and ease of use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety coprocessor for performing relevant operation by using specific instruction set
  • Information safety coprocessor for performing relevant operation by using specific instruction set
  • Information safety coprocessor for performing relevant operation by using specific instruction set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings. However, these embodiments do not limit the present invention, and any structural, method, or functional changes made by those skilled in the art according to these embodiments are included in the protection scope of the present invention.

[0036] Please refer to figure 1 As shown, in a specific embodiment of the present invention, an information security coprocessor that performs related operations through a specific instruction set includes the following units:

[0037] Several register files 10: they are configurable registers; wherein, the processor can be controlled externally by reading and writing to the register files through the APB bus. Wherein, the present invention adopts two kinds of buses to carry out data transmission: AHB (Advanced High performance Bus) system bus and APB (Advanced Peripheral Bus) peripheral bus, AHB is m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information safety coprocessor for performing relevant operation by using a specific instruction set. The information safety coprocessor comprises a plurality of register files, an instruction processing unit, an operation unit, a direct memory access (DMA) engine, a local memory, a key memory and a context memory. The specific instruction set comprises a cryptographic algorithm execution instruction, a context operation instruction, a key access instruction, a data transmission instruction, a logical operation instruction and a register write instruction. Therefore, the information safety coprocessor has the advantages of function flexibility, low cost, high performance, multitask support and usability, and can meet complicated multifunction and multitask requirements with low cost.

Description

technical field [0001] The invention relates to the field of information security processing, in particular to an information security co-processor used in an integrated circuit system to perform related operations through a specific instruction set. Background technique [0002] In the current digital information age, the security of information and data has become particularly important. Information security has become an active and important research field at present. Many security schemes and cryptographic algorithms have emerged as the times require, and related standards continue to develop, such as AES, RC4 and other algorithm standards. [0003] Traditional security solutions based on encryption technology are implemented through software. With the development of embedded technology and integrated circuit technology, solutions based on or using hardware provide many features superior to pure software solutions, such as security and processing speed; on the other ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/78
Inventor 妙维袁宏骏余红斌李张丰
Owner SOLOMON SYSTECH SHENZHEN LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products