Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information security chip for Internet of Things

An information security and Internet of Things technology, applied in the field of Internet of Things information security chips, can solve problems such as the inability to meet the low power consumption requirements of Internet of Things products, restricting the popularization and development of Internet of Things, and hidden dangers of Internet of Things products, so as to avoid key The effects of being copied and stolen, fast in operation, and high in security and anti-counterfeiting

Active Publication Date: 2019-05-28
佛山芯珠微电子有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some products in the current market use software encryption, resulting in slow data encryption and long cycle times. At the same time, some products are encrypted entirely by hardware. Although the speed is fast, the chip area is large and the power consumption is high, which cannot meet the requirements Low Power Requirements for Networked Products
At the same time, almost most of the products on the market store the key in non-volatile memory, which is vulnerable to intrusive attacks, resulting in the key being copied and stolen
These problems seriously restrict the popularization and development of the Internet of Things, and bring great security risks to the products of the Internet of Things.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security chip for Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] In the embodiment of the Internet of Things information security chip of the present invention, the internal structure diagram of the Internet of Things information security chip is as follows figure 1 shown. figure 1 Among them, the Internet of Things information security chip includes a central processing unit CPU interconnected through an on-chip bus, a dynamic memory SRAM, a flash memory Flash, an SM2 encryption algorithm unit 1 (that is, a national...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security chip of the Internet of Things. The chip comprises a central processor, a dynamic memory, a flash memory, an SM2 encryption algorithm unit, an SM3 encryption algorithm unit, an SM4 encryption algorithm unit, an AES encryption algorithm unit, a true random number generator, a physical unclonable function circuit, an I2C interface, a UART interface, anSPI interface, an I / O interface, a JTAG interface and a timer which are interconnected through an on-chip bus. The true random number generator is used for generating true random numbers; The physical unclonable function circuit is used for chip authentication and key generation, when a key needs to be used, a true random number generated by the true random number generator is input into the physical unclonable function circuit through an on-chip bus, the physical unclonable function circuit outputs a unique response sequence, and the response sequence is the key. The encryption and decryption operation speed is high, the hardware resource consumption is low, the power consumption is low, the secret key cannot be copied and stolen, and the security and anti-counterfeiting level is high.

Description

technical field [0001] The invention relates to the field of information security, in particular to an information security chip for the Internet of Things. Background technique [0002] Today is the era of rapid development of information technology, the Internet is rapidly becoming the carrier of all walks of life, promoting the progress of the industry, and the Internet of Things, as the basic medium and pioneer of Internet applications, greatly improves the efficiency of industry production and people's lives. Its application is called the third wave of the development of the world's information industry after computers and the Internet. At the same time, the security issue of the Internet of Things has also attracted people's attention. [0003] In order to ensure information security, the State Cryptography Administration of my country proposed the SM2 elliptic curve public key cryptography algorithm, the SM3 cryptographic hash algorithm and the SM4 block cipher algor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/06H04L29/08
CPCY02D30/50
Inventor 熊晓明徐崇耀郑欣詹瑞典
Owner 佛山芯珠微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products