Secure transmission method and circuit of chip security information

A security information and chip technology, applied in computer security devices, electrical digital data processing, record carriers used by machines, etc., can solve problems such as chip security information leakage, and achieve the effect of enhancing security

Active Publication Date: 2017-02-01
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the security problem that the software participates in the acce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method and circuit of chip security information
  • Secure transmission method and circuit of chip security information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0018] Such as figure 1 As shown in the schematic diagram of the hardware circuit of the present invention, 100 represents the security information transmission start register, 200 represents the NVM memory for storing security information, 300 represents the security information transmission state counter, 400 represents the NVM access address memory, 500 represents the security information decoding circuit, and 600 represents The security information is loaded into the register set, and 700 represents a sign that the transmission of the security information is completed.

[0019] figure 1 100 in represents the security information transmission start register, which is in an invalid state after the chip is initially powered on or the security information transmission operation is completed.

[0020] figure 1 The 200 in it represents NVM me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure transmission method and circuit of chip security information. The circuit comprises a control register used for starting security information transmission, an NVM used for storing the security information, a data register set used for loading the chip security information, a register used for generating an NVM access address, a counter used for recording a security information loading state, and a related combined logic unit. When the chip security information is accessed, firstly software sets the register used for starting the security information transmission to start access and transmission of the chip security information; hardware automatically performs read operation on the NVM used for storing the security information, decrypts returned data, and writes the data in the data register set used for loading the chip security information; and if the security information transmission is not finished (by judging a value of the counter used for recording the security information loading state), an access address register of the NVM is updated and the access and transmission of a next group of security information are started. The method provided by the invention can effectively protect the transmission of the chip security information.

Description

technical field [0001] The invention belongs to the field of safety design of integrated circuit chips, and in particular relates to a safe transmission method and circuit of key data information related to the safety function of the chip. Background technique [0002] With the rapid development of microelectronics technology, hardware indicators such as CPU processing power and memory capacity of smart card chips have been greatly improved. The continuous maturity of smart card technology makes it an ideal solution for many industries to solve traditional problems, and it plays an increasingly important role in many fields such as mobile communications, social security, medical care, and financial payment. The wide application of smart card chips has made users have higher requirements for the security of smart card chips. [0003] In order to improve the security of smart card applications, many security mechanisms have been introduced into the design of smart card chips,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/77G06F21/60G06K19/073
CPCG06F21/606G06F21/77G06K19/07309
Inventor 张英杰
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products