Protection method and system for security chip operating environment
A security chip and operating environment technology, applied to the protection of internal/peripheral computer components, etc., can solve problems such as weak software processing and protection capabilities, inability to improve security chip security protection capabilities, and insufficient security protection capabilities in the security chip operating environment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0043] The protection method of the safety chip operating environment described in the preferred embodiment of the present invention, such as figure 2 As shown, the protection method of the security chip operating environment comprises the following steps:
[0044]Step S10, the main processor transmits the data to be encrypted and decrypted and the program call of the encryption and decryption operation to the FPGA main controller through system communication.
[0045] Specifically, an FPGA main controller for data processing is pre-set between the main processor and the security chip....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


