Security access control method for chip storage circuit

A security access control and access control technology, applied in the direction of preventing unauthorized use of memory, digital data authentication, etc., can solve problems such as false comparison, software attack, etc., to improve security, solve anti-software attack, and improve flexibility Effect

Active Publication Date: 2014-04-09
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For SoC chips, due to the availability of CPU resources, most authorized access control circuits use a combination of software and hardware, such as reading the authentication code into the CPU, and the CPU performs the comparison of the authentication code. This authentication method is simple and easy to implement. , but there is a risk of being attacked by software. The attacking software can control the CPU to perform a false comparison, or force the comparison to pass, so as to obtain the corresponding access rights through identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access control method for chip storage circuit
  • Security access control method for chip storage circuit
  • Security access control method for chip storage circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The invention provides a pure hardware security protection solution based on identity authentication and access control control for chip storage circuits. The invention adopts two-level authentication of identity authentication and access control code authentication, and simultaneously uses pure hardware circuits to realize identity authentication and access The comparison of the control code not only improves the flexibility of authorized access control, but also improves its security.

[0021] In the present invention, the storage circuit is partitioned first, and then an independent identity authentication and access control circuit is set for each partition to complete the reading and comparison operation of the identity authentication code and the access control code, and output corresponding control signals. After the identity authentication is passed, the operator has the right to update the identity authentication code itself and rewrite the access control code, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security access control method for a chip storage circuit. Based on a nonvolatile storage circuit, subarea access control is conducted, an authentication and access control circuit is designed for each subarea, the authentication and access control circuits all skip in a mode of a state machine, authentication and access control signals under different states are output, and authorized access of the storage circuit is achieved. Two levels of authentication of identity authentication and access control authentication are adopted and finished by pure hardware circuits, and higher safety is achieved. The method is applicable to application specification integrated circuit (ASIC) chips and SoC chips of an integrated nonvolatile storage, even other circuit systems with the nonvolatile storage.

Description

technical field [0001] The invention belongs to the field of safety protection design of a non-volatile storage circuit in a chip, and in particular relates to a method for controlling security access of a chip storage circuit. Background technique [0002] For the chip, its most important protection objects are usually stored in the non-volatile memory of the chip, such as user sensitive data, software execution code, various operating data and system status information generated during runtime, etc., so it is not volatile Volatile memory is the key protection object of chip security protection. The protection of non-volatile memory focuses on ensuring authorized access to memory circuits and resisting layout analysis. The security access control circuit described in the present invention just realizes the authorized access to the storage circuit. [0003] The so-called authorized access to storage circuits includes two layers of meaning. The first layer of meaning means ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/31
Inventor 司焕丽
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products