Unlock instant, AI-driven research and patent intelligence for your innovation.

Programmable gate array chip encryption method and system based on static random access memory

A static random and memory technology, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as easy to be cracked, and achieve the effect of increasing reliability and difficulty of being cracked.

Active Publication Date: 2017-02-15
LISHUI BOYUAN TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although the above two methods can protect the FPGA chip to a certain extent, in the above two methods, the key only works once and is easy to be cracked, so it is necessary to further improve the protection effect of the FPGA chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Programmable gate array chip encryption method and system based on static random access memory
  • Programmable gate array chip encryption method and system based on static random access memory
  • Programmable gate array chip encryption method and system based on static random access memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] In this embodiment, taking the method of combining an external encryption chip as an example, the encryption method flow of this application is described in detail, as follows:

[0073] In this embodiment, the encryption method includes:

[0074] Initial configuration steps such as Figure 3a Shown:

[0075] The external memory sends configuration data to the FPGA chip, and the configuration data includes the first configuration information for configuring the service function circuit and the second configuration information for configuring the authorization circuit corresponding to the service function circuit; wherein, the first configuration information includes its The function level information of the configured service function circuit, the second configuration information includes the corresponding information that service function circuits of different levels correspond to different authorized circuits, and service function circuits of the same level correspond...

Embodiment 2

[0093] In this embodiment, the flow of the encryption method of the present application is described in detail by using an encryption method combined with an FPGA built-in decryption module.

[0094] Such as Figure 5 As shown, in this embodiment, the encryption method includes:

[0095] Initial configuration steps:

[0096] The external memory sends encrypted configuration data to the FPGA chip, and the configuration data includes first configuration information for configuring the service function circuit and second configuration information for configuring the authorization circuit corresponding to the service function circuit;

[0097] The FPGA chip decrypts the encrypted configuration data through the built-in decryption module, configures the circuit according to the configuration data to form a business function circuit and an authorization circuit corresponding to the business function circuit, and puts the business function circuit in a waiting state, and authorizes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a static random access memory based programmable gate array chip encryption method and system. On the basis of an original encryption mode, corresponding authorization circuits are arranged for configured business function circuits, when one specific business function circuit is needed for working, the authorization circuit corresponding to the specific business function circuit sends a service request to a coprocessor according to functions of the business function circuit, the compressor generates a key seed, a microprocessor and the authorization circuit complete temporary enciphered data channel connection according to the key seed, the authorization circuit authorizes the corresponding business function circuit to work, and a processing result of the business function circuit is sent to the microprocessor via a data format, length and an encryption mode required by the microprocessor, thus dynamic encryption protection in the process of business processing is realized, and reliability of the system and difficulty in cracking are heightened.

Description

technical field [0001] The invention relates to the field of static random access memory (SRAM)-based programmable gate array (FPGA) design, in particular to a method and system for encrypting a programmable gate array chip based on static random access memory (SRAM). Background technique [0002] Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) is being widely used due to its advantages of fast speed, high density, low price, and flexible online upgrade. The process or operation of sending the FPGA design program into the FPGA chip is generally called the configuration of the FPGA chip, and the configured FPGA has the functions required by the user. When the FPGA chip is in the normal working state, its configuration data is stored in the FPGA programming component SRAM (static random access memory). Due to the volatility of the SRAM, the configuration information in the FPGA chip will be lost after power-off, so each time the system is powered on Every ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14
Inventor 罗彬伏德雨薛飞汪顺长陈东
Owner LISHUI BOYUAN TECH CO LTD