Security access control method for chip storage circuit

A security access control and access control technology, applied in the direction of preventing unauthorized use of memory, digital data authentication, etc., can solve problems such as software attacks and false comparisons, improve security, improve flexibility, and solve anti-software attacks Effect

Active Publication Date: 2016-04-27
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For SoC chips, due to the availability of CPU resources, most authorized access control circuits use a combination of software and hardware, such as reading the authentication code into the CPU, and the CPU performs the comparison of the authentication code. This authentication method is simple and easy to implement. , but there is a risk of being attacked by software. The attacking software can control the CPU to perform a false comparison, or force the comparison to pass, so as to obtain the corresponding access rights through identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access control method for chip storage circuit
  • Security access control method for chip storage circuit
  • Security access control method for chip storage circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The invention provides a pure hardware security protection solution based on identity authentication and access control control for chip storage circuits. The invention adopts two-level authentication of identity authentication and access control code authentication, and simultaneously uses pure hardware circuits to realize identity authentication and access The comparison of the control code not only improves the flexibility of authorized access control, but also improves its security.

[0021] In the present invention, the storage circuit is partitioned first, and then an independent identity authentication and access control circuit is set for each partition to complete the reading and comparison operation of the identity authentication code and the access control code, and output corresponding control signals. After the identity authentication is passed, the operator has the right to update the identity authentication code itself and rewrite the access control code, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure access control method for a chip storage circuit, which performs partition access control based on a non-volatile storage circuit, and independently designs an authentication and access control circuit for each partition, and both the authentication and access control circuits jump in the form of a state machine Turn to output authentication and access control signals in different states to realize authorized access to storage circuits. The method of the invention adopts two-level authentication of identity authentication and access control authentication, and the two-level authentication circuits are all completed by pure hardware circuits, which has higher security. The invention can be used in ASIC chip integrating nonvolatile memory, SoC chip, and even other circuit systems with nonvolatile memory.

Description

technical field [0001] The invention belongs to the field of safety protection design of a non-volatile storage circuit in a chip, and in particular relates to a method for controlling security access of a chip storage circuit. Background technique [0002] For the chip, its most important protection objects are usually stored in the non-volatile memory of the chip, such as user sensitive data, software execution code, various operating data and system status information generated during runtime, etc., so it is not volatile Volatile memory is the key protection object of chip security protection. The protection of non-volatile memory focuses on ensuring authorized access to memory circuits and resisting layout analysis. The security access control circuit described in the present invention just realizes the authorized access to the storage circuit. [0003] The so-called authorized access to storage circuits includes two layers of meaning. The first layer of meaning means ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/31
Inventor 司焕丽
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products