Unlock instant, AI-driven research and patent intelligence for your innovation.

A method to enhance the security of secondary radar fpga

A secondary radar and security technology, applied in the direction of climate sustainability, encryption device with shift register/memory, user identity/authority verification, etc., can solve the problem of the small number of secondary radars, the maintenance cost of the designer, and later spare parts Loss of economic benefits, high design cost and hardware flexibility requirements, etc., to achieve low cost, prevent leakage, and prevent copying

Active Publication Date: 2015-09-09
四川九洲空管科技有限责任公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The number of secondary radars is generally small, and the field maintenance must be upgraded or improved according to the actual situation and the requirements of the foreign party, so it has high requirements for design cost and hardware flexibility
In the long run, the benefits obtained are obvious, but for the designer, it is the loss of economic benefits such as maintenance costs and later spare parts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to enhance the security of secondary radar fpga
  • A method to enhance the security of secondary radar fpga
  • A method to enhance the security of secondary radar fpga

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0029] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0030] 1 Multiple Configuration Technology

[0031] The multi-configuration technology is a technology that stores two or more configuration files in the configuration memory chip and is triggered by the FPGA itself for reconfiguration. The reconfiguration address and mode can be set in ISE or in the reconfiguration command. After receiving the reconfiguration control command, the FPGA sends a reconfiguration command through interfaces such ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for enhancing the safety of a secondary radar FPGA (Field Programmable Gate Array) and relates to the design scope of the safety of the FPGA. The method comprises the following steps of: after the FPGA loads a configuration file, firstly, reading an ID (Identity) of hardware; secondly, reading a check code in a memory; finally, deciphering the check code and then comparing the deciphered check code with the ID; if the deciphered check code is consistent with the ID, executing a normal function; otherwise, starting a reconfiguration command; after the FPGA is reconfigured, firstly encrypting the read ID and then storing the encrypted ID on an ISF (Information System Finishing); and deleting the configuration file used in a reconfiguration process. According to the method disclosed by the invention, a resource of the FPGA is sufficiently utilized and a design cost is reduced; and a method for binding the ID of the hardware and monitoring a JTAG interface is adopted so as to prevent a secondary user from conducting reverse engineering, cloning and the like on the FPGA. Furthermore, the space occupancy rate and the power consumption are obviously improved. Currently, the design scheme is used in certain secondary radar equipment and the function is stable and reliable.

Description

technical field [0001] The invention relates to the safety design category of FPGA, in particular to a method for enhancing the safety of secondary radar FPGA. Background technique [0002] The secondary radar is a secondary radar designed and manufactured by our company for some countries with the function of identifying friend or foe in the western system. The number of secondary radars is generally small, and the field maintenance must be upgraded or improved according to the actual situation and the requirements of the foreign party, so it has high requirements for design cost and hardware flexibility. In addition, in order to protect the interests of the enterprise itself and even the country, it is necessary to prevent reverse engineering, over-construction and cloning of key technologies (modules) by unauthorized parties. According to the characteristics of secondary radar, we choose XC3S700AN ​​for FPGA (encoding module) design. XC3S700AN ​​is a kind of Spartan3AN ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06
CPCY02B60/33Y02B60/31Y02D30/50
Inventor 刘伟伟
Owner 四川九洲空管科技有限责任公司