Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method and system for security chip operating environment

A security chip and operating environment technology, applied to the protection of internal/peripheral computer components, etc., can solve problems such as weak software processing and protection capabilities, inability to improve security chip security protection capabilities, and insufficient security protection capabilities in the security chip operating environment

Active Publication Date: 2020-08-04
网御安全技术(深圳)有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The security chip's own hardware and software processing capabilities are low, resulting in the inability to improve the security protection capability of the security chip
For the security chip, in order to cope with physical attacks such as grinding, semi-invasive attacks such as laser and electromagnetic signal injection, and non-invasive attacks such as differential current analysis, the CPU core, encryption and decryption circuits, storage modules and buses in the security chip are all A large number of protection designs have been added, resulting in the system frequency and processing capacity of the security chip being below the middle level, and only simple operating systems and applications can be run, and the processing capacity and protection capacity of the software are relatively weak.
[0010] In other words, there is a problem of insufficient security protection capabilities in the security chip operating environment in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and system for security chip operating environment
  • Protection method and system for security chip operating environment
  • Protection method and system for security chip operating environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] The protection method of the safety chip operating environment described in the preferred embodiment of the present invention, such as figure 2 As shown, the protection method of the security chip operating environment comprises the following steps:

[0044]Step S10, the main processor transmits the data to be encrypted and decrypted and the program call of the encryption and decryption operation to the FPGA main controller through system communication.

[0045] Specifically, an FPGA main controller for data processing is pre-set between the main processor and the security chip....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method and a system for a safe chip running environment. The method comprises the following steps: a main processor transmits data to be encrypted and decrypted and program calls of encryption and decryption operations to an FPGA main controller through system communication; the FPGA master decomposes the program call into a series of sub-procedures, and generates the corresponding command call sequence and data packet for the operations involving the security chip; the FPGA master sends corresponding command calls and related data to the security chip, andthe security chip feeds back the operation results to the FPGA master; the FPGA master completes the program call corresponding sub-process, at the same time aggregates the operation results from thesecurity chip, and sends the final operation results to the main processor. The invention sends command call to the safety chip through the FPGA master controller, collects the operation result fromthe safety chip, and sends the final operation result to the main processor, which greatly improves the safety protection capability for the safety chip.

Description

technical field [0001] The invention relates to the technical field of security chips, in particular to a method and system for protecting the operating environment of security chips. Background technique [0002] A security chip refers to an integrated circuit chip that implements one or more cryptographic algorithms and uses cryptographic techniques directly or indirectly to protect keys and sensitive information. As the bottom-level security guarantee of smart terminals, the application of security chips can effectively prevent hacker attacks and cracks, improve the security of smart terminals, and protect users' personal information and application data security. At present, security chips are increasingly being used in smart terminals to provide reliable protection for financial payment and online identity authentication. [0003] The security chip is a trusted platform module. It is a device that can independently generate keys and encrypt and decrypt. It has an indep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/72
CPCG06F21/72
Inventor 罗禹铭罗禹城
Owner 网御安全技术(深圳)有限公司