Chip legality authentication method and device

A legal and chip technology, applied in the field of information security and integrated circuits, can solve the problems of circuit module or key certificate cracking, the security risk of chip authentication mechanism, etc., to prevent implantation, avoid illegal authentication requests, avoid Ineffective effect

Active Publication Date: 2015-12-09
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of this chip authentication mechanism itself also has risks, and the ci

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip legality authentication method and device
  • Chip legality authentication method and device
  • Chip legality authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0046] The embodiment of the present invention discloses a method and device for authenticating the legality of a chip to safely authenticate the legality of a chip.

[0047] See figure 1 , A method for authenticating chip legitimacy provided by an embodiment of the present invention includes:

[0048] S101. The terminal obtains a random number, and encrypts the random number for the first time by using the terminal key built into the termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a chip legality authentication method and device. The chip legality authentication method comprises the steps that the terminal acquires a random number, performs preliminary encryption on the random number to obtain a first ciphertext, and sends the random number and the first ciphertext to an authenticated chip; the authenticated chip performs secondary encryption on the random number to obtain a second ciphertext, judges whether the second ciphertext is the same as the first ciphertext or not, encrypts the random number for the third time to obtain a third ciphertext if the second ciphertext is the same as the first ciphertext, and sends the third ciphertext to the terminal; the terminal encrypts the random number for the fourth time to obtain a fourth ciphertext; the terminal judges whether the fourth ciphertext is the same as the third ciphertext or not, wherein if the fourth ciphertext is the same as the third ciphertext, the authenticated chip is a legal chip. According to the chip legality authentication method, due to such a bidirectional authentication mechanism, an illegal authentication request can be effectively avoided, and the chip can only be authenticated by a legal chip authenticator, so that the safety of chip authentication is guaranteed.

Description

technical field [0001] The invention relates to the fields of information security and integrated circuits, and more specifically, to a chip legality identification method and device. Background technique [0002] In various current information system applications, various chips issued through illegal channels may be at risk of being cracked. This cracking includes not only the logical functions of the chip, but also the private data or keys inside the chip. Chip cracking methods include reverse engineering, bypass attacks, intrusive physical attacks, and hardware Trojan horses or security holes. After the chip is cracked, it may be copied illegally, resulting in no protection of intellectual property rights and no guarantee of security. Therefore, a safe and reliable chip legitimacy identification method is needed to ensure that before an active chip performs a predetermined function, it can be confirmed whether it is legally manufactured or a counterfeit chip. If it is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/16G06F21/46
CPCG06F21/16G06F21/46
Inventor 童元满
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products