Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A hardware-based dynamic data protection method for embedded system

An embedded system, dynamic data technology, applied in digital data protection, internal/peripheral computer component protection, electrical digital data processing, etc., to achieve the effect of reducing performance loss, system performance loss, and shortening delay

Active Publication Date: 2018-12-25
BEIHANG UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Adding a data security protection mechanism in the embedded system processor will undoubtedly bring additional overhead to the performance of the entire system, the area of ​​the chip, and on-chip storage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware-based dynamic data protection method for embedded system
  • A hardware-based dynamic data protection method for embedded system
  • A hardware-based dynamic data protection method for embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] For the embedded system data threat model proposed by the data protection method in the present invention, see figure 1 As shown, we believe that the processor chip is a trusted area, which mainly defends against attacks that occur off-chip and on the bus, and protects the confidentiality and integrity of on-chip data. It adopts lightweight hash method and stream encryption method, and adds a security protection mechanism between the data buffer of the embedded system and the external memory. The security module is located in the trusted area of ​​the chip. During the program running, when the data cache When the device misses the target and exchanges data blocks with the external memory, the security module provides confidentiality and integrity protection for the data blocks stored off-chip. When the data buffer writes data to the external memory, see figure 2 As shown, the security module calculates the hash value of the data block and uses it as the verification i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an embedded system dynamic data protection method based on hardware realization, which comprises the following steps: 1, a safety module caching data blocks to be stored; 2, calculating the check information of the data block by using a hash method; 3, generating a key stream based on an advanced encryption standard, i. E. AES; 4, encrypting the data block and its checking information by use the key stream to realize the confidentiality protection; 5, when the external data is read into the chip, the security module generating a key stream; 6, decrypting the read data and the check information thereof; 7, recalculating the check information of the decrypted data block; 8, comparing the decryption check information in the step 6 with the check information in the step7, and judging whether the integrity of the data is attacked or not. The invention realizes the confidentiality protection and integrity verification of the embedded system data in the non-trusted area, solves the problems that the off-chip data is monitored, stolen, tampered and the like, thereby improving the safety of the embedded system data.

Description

technical field [0001] The invention relates to a dynamic data protection method of an embedded system based on hardware, which adopts a lightweight hash method and a stream encryption method. It provides confidentiality and integrity protection for the data stored outside the chip. When the data buffer in the embedded system writes data to the external memory, the hash value of the data block is calculated and used as the verification information of the data integrity, and then Use stream encryption method to encrypt the data block and its verification information, and store the ciphertext in the external memory to realize the confidentiality protection of the data; when the data buffer reads data from the external memory, firstly, the data block and its verification The verification information is decrypted, and the hash value of the data block is recalculated after decryption, and compared with the decrypted verification information, so as to monitor the attack on data inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/64G06F21/71
CPCG06F21/602G06F21/64G06F21/71
Inventor 王翔张晓冰王维克田运通张准郝强
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products