Low-electric-leakage bi-CPU core safe chip configuration
A security chip, nuclear security technology, applied in data processing power supply, electrical digital data processing, instruments and other directions, can solve the problems of static power consumption can not be ignored, software design increases the difficulty, etc., to achieve the effect of reducing the overall power consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0009] As shown in Figure 2, in the security chip, there are two CPU subsystems, one is the CPU_1 subsystem (200) and the other is the CPU_2 subsystem (300). The CPU_1 subsystem completes communication interface processing and instruction analysis, and the CPU_2 subsystem provides cryptographic computing services and sensitive information processing. The CPU_1 subsystem and the CPU_2 subsystem have their own physically separated memory resources, and exchange data through a dedicated data channel (270).
[0010] CPU_1 (222) can use standard 8051 low logic gates and low computing power non-safe CPU core, in order to achieve communication processing and instruction analysis, through a simple system bus integrated memory unit_1 (221), communication interface unit (223) And the system control unit (224), the memory unit_1 includes RAM and ROM required for the normal operation of CPU_1. Due to its simpler functions, the size of this part of the memory is much lower than that of the C...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap