Smart card safety protection circuit and smart card safety protection method

A security protection, smart card technology, applied in computer security devices, electrical digital data processing, internal/peripheral computer component protection, etc.

Inactive Publication Date: 2012-07-11
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Driven by interests, smart cards are faced with more and more various attack methods, among which interference injection attack is a common attack method, such as power interference, optical interference, pulse interference, etc. The operation of the central processing unit (CPU) is abnormal, and the so-called runaway phenomenon occurs, which causes the CPU to deviate from the normal program operation. For example, the application process that has not passed the certification directly rewrites the stored data, and the record stored in the card is incorrectly changed.
In addition, the working environment of the smart card is unstable or the operation is not standardized (hot plugging, etc.) will also cause abnormal CPU operation
[0004] To protect against such problems, the general practice is to use various sensors to detect the working environment of the chip, including voltage detection, temperature detection, burr detection, light detection, etc. Once an abnormality is found, the chip is reset to prevent The chip is misoperated again, but there are problems with the response time, detection accuracy and range of these sensors, and the protection effect is not particularly ideal
In particular, these sensors are generally implemented by analog circuits, which occupy a large chip area. The obvious circuit structure can be distinguished from the physical layout. Attackers can bypass these sensors through FIB and other means, resulting in the failure of security protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card safety protection circuit and smart card safety protection method
  • Smart card safety protection circuit and smart card safety protection method
  • Smart card safety protection circuit and smart card safety protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The method and its specific implementation will be described in detail below in conjunction with the accompanying drawings.

[0026] figure 1 For overall block diagram of the present invention, at first take out this bar instruction code and program pointer PC (abbreviation PC pointer) and last instruction code and PC pointer (1) (do not take out last instruction code and PC pointer when running the first instruction ); check in real time whether the operation of the CPU conforms to the operation order rule (2), and monitor the output signal of the inspection. The monitoring method has the characteristics of time-sharing and distribution, that is, two or more monitoring circuits ((3) , (4),...(5))) Monitor whether the operation of the CPU conforms to the operation sequence rules, and output two or more monitoring signals including high and low logic levels. Once an abnormality occurs, these monitoring signals Trigger the smart card chip to enter abnormal processing (6...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart card safety protection method. The method is used for monitoring a running order rule of a CPU (Central Processing Unit) in real time in a time-sharing and distributed manner, and detecting whether the running of the CPU meets the running order rule; once the error of the program running order is detected, the program with error is stopped, and a chip is trigged to deal with the exception so as to ensure the execution of the program according to the correct running order and prevent program fleet; and effective safety protection is provided when the chip of the smart card is influenced by external attacks or the runtime environment is unsteady. The invention also discloses a circuit for realizing the method. The circuit comprises a current instruction code register (20), a jumping destination address register (16), a PC (Personal Computer) register (14), a PC-PRO register (22), an adding device (24), a comparator (15), a comparator (17), a comparator (26), a comparator (21), a monitoring circuit 1 (38) and a monitoring circuit 2 (39). The circuit monitors the running order of the CPU by the monitoring circuit 1 and the monitoring circuit 2, and if the CPU runs exceptionally, the circuit triggers the chip of the smart card at different time to deal with the exception so as to prevent the chip from exception.

Description

technical field [0001] The invention is mainly applied to the design field of safety micro-controller chips represented by smart cards, which can effectively improve resistance to external interference attacks and enhance the stability and reliability of chip work. Background technique [0002] In recent years, security microcontrollers represented by smart cards have been widely used in social life. As the carrier of system security and key data, smart cards are often used in fields such as identity authentication, transportation, telecommunications, and financial payment. [0003] Driven by interests, smart cards are faced with more and more various attack methods, among which interference injection attack is a common attack method, such as power interference, optical interference, pulse interference, etc. The operation of the central processing unit (CPU) is abnormal, and the so-called runaway phenomenon occurs, which causes the CPU to deviate from the normal program ope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/073G06F21/00G06F21/77
Inventor 叶茵
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products