Security chip and its attack detection circuit

A technology for attack detection and circuit detection, which is applied in the direction of measuring electrical variables, measuring current/voltage, and measuring devices, and can solve problems such as leakage of confidential data, failure of chip security operations, and bypass of security measures.

Active Publication Date: 2015-12-23
SHENZHEN STATE MICRO TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Fault attack refers to making the chip work under abnormal working conditions, such as abnormal voltage, temperature, clock frequency, electromagnetic environment, etc. These abnormal working conditions may induce wrong behavior of the chip and invalidate some security operations inside the chip , causing the security measures taken by the chip to be bypassed, thereby leaking confidential data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip and its attack detection circuit
  • Security chip and its attack detection circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] The invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0010] Such as figure 1 As shown, the specific implementation of the attack detection circuit of the present invention, the attack detection circuit is built into the security chip, which includes:

[0011] The sampling network 20 is used for sampling and filtering the voltage glitches on the power supply and the ground; and can distinguish the noise signal, jitter and voltage glitch attacks on the power supply and the ground;

[0012] The detection circuit 21 is used to detect the signal output by the sampling network;

[0013] The output stage 22 is used to process the output signal of the detection circuit and output the detection result.

[0014] Specifically, the sampling network 20, the detection circuit 21 and the output stage 22 may have the following structure:

[0015] The sampling network 20 includes: resistors R1, R2, R3, R4 and capacitors C1, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An attack detection circuit for a security chip and the security chip thereof. The attack detection circuit includes: a sampling network, which is used to sample and filter the voltage burr on the power supply and the ground, and can distinguish the noise signal, jitter and voltage burr attack on the power supply and the ground; The output signal is detected; the output stage is used to process the output signal of the detection circuit and output the detection result. Since the attack detection circuit detects the semi-intrusion voltage glitch attack on the power supply or ground of the security chip, and outputs the corresponding detection result, when an attack is received, it can warn the security chip system, and the system takes appropriate security measures. Measures prevent potential safety hazards, thereby improving the anti-fault attack capability of the security chip system.

Description

technical field [0001] The invention belongs to the design field of security chips, in particular to a circuit for detecting that security chips are invaded. Background technique [0002] Security chips are widely used in various fields of the information society, and their main functions include secure storage, encryption, decryption, and identification of key user data. [0003] Because of the importance of the data in the security chip, the fault attack has become one of the main attack methods to obtain the data in the security chip. Fault attack refers to making the chip work under abnormal working conditions, such as abnormal voltage, temperature, clock frequency, electromagnetic environment, etc. These abnormal working conditions may induce wrong behavior of the chip and invalidate some security operations inside the chip , causing the security measures taken by the chip to be bypassed, thereby leaking confidential data. Contents of the invention [0004] The obje...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G01R19/165
Inventor 王新亚吴晓勇
Owner SHENZHEN STATE MICRO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products