Chip security protection method and system

A security protection and chip technology, used in computer security devices, digital data protection, internal/peripheral computer component protection, etc. The effect of simplifying security design

Active Publication Date: 2022-02-11
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +3
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the development of chip technology, the current security chip will face more complex multi-application fields, and there are many operations that require security control. It is too complicated and difficult to set corresponding authority authentication instructions for all these operations.
Some existing technologies use the method of defining security status words for different applications to simplify the security design to a certain extent. However, when there are many applications, the security status words will still explode. When the application is switched and the security status changes, the information synchronization The work is very complex and error-prone, and will lead to a decrease in chip execution efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip security protection method and system
  • Chip security protection method and system
  • Chip security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0033] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0034] The invention provides a method for chip safety protection, which can realize fine management in the aspect of chip safety protection and improve chip execution efficiency. Preferably, according to an embodiment of the present invention, the chip security protection method is to configure a security state machine in the chip operating system and customize personalized access rights ranges and access modes for files i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chip safety protection method. The method includes the following steps: configuring a security state machine in the chip operating system, and the security state machine realizes the transition of the security state of the chip under the drive of the chip instruction; Different file access constraints; when reading a protected file, check whether the status word in the security state machine satisfies the access constraints of the file, if the condition is met, the file is read, otherwise the file cannot be read . The chip security protection method can realize fine management of chip security protection, simplify security design, and improve chip execution efficiency.

Description

technical field [0001] The invention relates to the field of chip security protection, in particular to a chip security protection method and system. Background technique [0002] With the rapid development of microelectronics technology, various electronic devices have sprung up like mushrooms after rain. In order to protect the security of user information, many devices require security authentication, so security chip products are widely used in current electronic products. The security chip generally has an independent CPU and an algorithm module with national secret qualifications, and is installed in the terminal host to provide computing services, data storage and security authentication functions. People are familiar with such as smart phone SIM card, U-shield in the financial field, or various ESAM and PSAM chips that are unknown and work silently in the device. [0003] With the development of chip technology, the current security chip will face more complex mult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/71G06F21/62
CPCG06F21/6218G06F21/71
Inventor 徐平江付青琴袁艳芳庞振江王于波胡静敏李琨刘建军梁飞朱云良
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products