Embedded microprocessor unclonable function secret key certification system and method

A microprocessor and key authentication technology, applied in the direction of electrical digital data processing, instruments, calculations, etc., can solve the problems of lack of independent intellectual property rights, use restrictions, and high price of security products, so as to reduce the time of combination and reduce the cost , enhance the effect of versatility

Inactive Publication Date: 2014-01-29
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] At present, the security products widely used in the industry lack independent intellectual property rights, and are relatively old a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded microprocessor unclonable function secret key certification system and method
  • Embedded microprocessor unclonable function secret key certification system and method
  • Embedded microprocessor unclonable function secret key certification system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0040] At present, the software of many embedded products lacks protection, or the software is encrypted by a common key encryption method. In this case, the attacker can use physical attack to physically attack the memory storing the key and easily obtain the key information, and then can copy and steal the embedded software and further threaten the security of the embedded device. Embedded so...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded microprocessor unclonable function secret key certification system. The embedded microprocessor unclonable function secret key certification system comprises an embedded terminal, a burning equipment terminal and a PC terminal. The embedded terminal comprises a PUF module for extracting data to be analyzed and an IAP module. The burning equipment terminal comprises a module for processing a program to be burned. The PC terminal comprises an embedded certification program generating module, a PUF analysis module, a database module, a hash data generating module and a help data generating module. The PUF module for extracting data to be analyzed is used for extracting primary power-on data in an SRAM repeatedly and transmitting the data to the PUF analysis module. The PUF analysis module is used for analyzing the collected primary power-on data and the size of the sample of the primary power-on data. The PUF analysis module is further used for transmitting an acquired secret key to the hash data generating module and the help data generating module. The embedded microprocessor unclonable function secret key certification system prevents an attacker from decrypting the secret key of embedded equipment through physical attack to copy the whole embedded software, and therefore the copyright of the embedded software is protected.

Description

technical field [0001] The invention belongs to the field of embedded system security, and more specifically relates to an embedded microprocessor non-clonable function key authentication system and method. Background technique [0002] In recent years, the demand for embedded devices in my country has surged. Under the temptation of huge profits, many enterprises abandon the traditional "R&D-production-sales" model and instead adopt the "imitation-production-sales" approach. The products developed by many companies with painstaking efforts are cracked by competitors shortly after they are put on the market. From hardware to software, they are completely cloned and put on the market after repackaging. There are also companies that entrust manufacturers to produce products, and the manufacturers additionally produce a large number of the same products and put them on the market under different brands. [0003] In this atmosphere of vicious imitation, a large number of compa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12
CPCG06F21/123G06F21/602
Inventor 刘政林张振华刘文超王雪邹雪城郑朝霞童乔凌
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products