Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of things information security chip

An information security and Internet of Things technology, applied in the field of Internet of Things information security chips, can solve the problems of inability to meet the low power consumption requirements of Internet of Things products, restricting the popularization and development of Internet of Things, and hidden dangers of Internet of Things products, so as to avoid key The effects of being copied and stolen, fast in operation, and high in security and anti-counterfeiting

Active Publication Date: 2022-04-01
佛山芯珠微电子有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some products in the current market use software encryption, resulting in slow data encryption and long cycle times. At the same time, some products are encrypted entirely by hardware. Although the speed is fast, the chip area is large and the power consumption is high, which cannot meet the requirements Low Power Requirements for Networked Products
At the same time, almost most of the products on the market store the key in non-volatile memory, which is vulnerable to intrusive attacks, resulting in the key being copied and stolen
These problems seriously restrict the popularization and development of the Internet of Things, and bring great security risks to the products of the Internet of Things.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things information security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] In the embodiment of the Internet of Things information security chip of the present invention, the internal structure diagram of the Internet of Things information security chip is as follows figure 1 shown. figure 1 Among them, the Internet of Things information security chip includes a central processing unit CPU interconnected through an on-chip bus, a dynamic memory SRAM, a flash memory Flash, an SM2 encryption algorithm unit 1 (that is, a national...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things information security chip, comprising a central processing unit, a dynamic memory, a flash memory, an SM2 encryption algorithm unit, an SM3 encryption algorithm unit, an SM4 encryption algorithm unit, an AES encryption algorithm unit, a true random Number generator, physical unclonable function circuit, I2C interface, UART interface, SPI interface, I / O port, JTAG interface and timer; true random number generator is used to generate true random numbers, and physical unclonable function circuit is used for chip authentication and key generation, when the key needs to be used, the true random number generated by the true random number generator is input to the physical unclonable function circuit through the on-chip bus, and the physical unclonable function circuit outputs a unique response sequence, the response sequence is key. The encryption and decryption operation speed of the invention is faster, the consumption of hardware resources and power consumption is less, the key cannot be copied and stolen, and the security and anti-counterfeiting level is higher.

Description

technical field [0001] The invention relates to the field of information security, in particular to an information security chip for the Internet of Things. Background technique [0002] Today is the era of rapid development of information technology, the Internet is rapidly becoming the carrier of all walks of life, promoting the progress of the industry, and the Internet of Things, as the basic medium and pioneer of Internet applications, greatly improves the efficiency of industry production and people's lives. Its application is called the third wave of the development of the world's information industry after computers and the Internet. At the same time, the security issue of the Internet of Things has also attracted people's attention. [0003] In order to ensure information security, the State Cryptography Administration of my country proposed the SM2 elliptic curve public key cryptography algorithm, the SM3 cryptographic hash algorithm and the SM4 block cipher algor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/06H04L67/12
CPCY02D30/50
Inventor 熊晓明徐崇耀郑欣詹瑞典
Owner 佛山芯珠微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products