Security chip and attack detection circuit thereof

A technology of attack detection and detection circuit, applied in the direction of measuring electrical variables, measuring current/voltage, measuring devices, etc., can solve the problems of bypassing security measures, leaking confidential data, and failure of chip security operations.

Active Publication Date: 2013-04-10
SHENZHEN STATE MICRO TECH CO LTD
View PDF4 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Fault attack refers to making the chip work under abnormal working conditions, such as abnormal voltage, temperature, clock frequency, electromagnetic environment, etc. These abnormal working condit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip and attack detection circuit thereof
  • Security chip and attack detection circuit thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] The invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0010] Such as figure 1 As shown, the specific implementation of the attack detection circuit of the present invention, the attack detection circuit is built into the security chip, which includes:

[0011] The sampling network 20 is used for sampling and filtering the voltage glitches on the power supply and the ground; and can distinguish the noise signal, jitter and voltage glitch attacks on the power supply and the ground;

[0012] The detection circuit 21 is used to detect the signal output by the sampling network;

[0013] The output stage 22 is used to process the output signal of the detection circuit and output the detection result.

[0014] Specifically, the sampling network 20, the detection circuit 21 and the output stage 22 may have the following structure:

[0015] The sampling network 20 includes: resistors R1, R2, R3, R4 and capacitors C1, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack detection circuit for a security chip and the security chip of the attack detection circuit. The attack detection circuit comprises a sampling network, a detecting circuit and an output electrode, wherein the sampling network is used for carrying out sampling and filtering treatment on voltage burrs on a power supply and the ground and distinguishing noise signals and vibration on the power supply and the ground from the attack of the voltage burrs; the detecting circuit is used for detecting signals output by the sampling network; and the output electrode is used for treating output signals of the detecting circuit and outputting detecting results. The attack detection circuit is used for detecting the semi-invasion voltage burr attack to which the power supply of the security circuit or the ground is subjected and outputting corresponding detecting results, thus a security chip system can be warned when the power supply of the security chip or the ground is subjected to attack, appropriate security measures can be carried out by the security chip system for preventing potential safety hazards, and the fault attack resisting ability of the security chip system is increased.

Description

technical field [0001] The invention belongs to the design field of security chips, in particular to a circuit for detecting that security chips are invaded. Background technique [0002] Security chips are widely used in various fields of the information society, and their main functions include secure storage, encryption, decryption, and identification of key user data. [0003] Because of the importance of the data in the security chip, the fault attack has become one of the main attack methods to obtain the data in the security chip. Fault attack refers to making the chip work under abnormal working conditions, such as abnormal voltage, temperature, clock frequency, electromagnetic environment, etc. These abnormal working conditions may induce wrong behavior of the chip and invalidate some security operations inside the chip , causing the security measures taken by the chip to be bypassed, thereby leaking confidential data. Contents of the invention [0004] The obje...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G01R19/165
Inventor 王新亚吴晓勇
Owner SHENZHEN STATE MICRO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products