Root key generation and isolation method for multiple systems and root key module

A key generation and root key technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problem of increasing root key usage scenarios and usage frequency, unfavorable data isolation and protection, and increasing chip root key information entropy Leakage and other issues, to reduce the probability of leakage, to avoid the effect of information bypass violence

Inactive Publication Date: 2019-10-25
NANJING SEMIDRIVE TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the situation where multiple virtual systems need to be run on the same SoC system, if multiple virtual systems share the same root key, this is not only not conducive to the isolation and protection of data between systems, but also inevitably increases the usage scenarios of the root key And the frequency of use increases the probability of chip root key information entropy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Root key generation and isolation method for multiple systems and root key module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose and technical solutions of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings of the embodiments of the present invention. Apparently, the described embodiments are some, not all, embodiments of the present invention. Based on the described embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0025] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It should also be understood that terms such as those defined in commonly used dictionaries should be und...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a root key generation and isolation method for multiple systems and a root key module. The method comprises the following steps: firstly, combining feature information corresponding to a system needing to generate a key with a chip root secret key to form secret key source data corresponding to the system, and then carrying out key generation operation on the key source data to obtain system root key data corresponding to the system. In this way, the obtained root keys corresponding to all the systems can be kept independent of one another due to the fact that the generated feature information is different. By applying the virtualization design of the invention, different system root keys can be generated for different systems, and security key isolation between different systems can be effectively realized. Because each system does not need to separately call the chip root key for encryption, the usage scenario of the chip root key is almost limited to the situation that the chip root key needs to be used when only the system root key is generated. Therefore, the probability of leakage of the root key information of the chip can be reduced.

Description

technical field [0001] The invention relates to the field of data security of a system on chip (SoC), in particular to a root key security technology. Background technique [0002] Virtualization (English: Virtualization) is a resource management technology, which abstracts and transforms physical resources, such as computing logic, interfaces, and storage resources, and presents them, breaking the inseparable barriers between physical structures, so that users can use Use these physical resources in a better way than the original configuration. These new virtual portions of resources are not constrained by how existing resources are set up, nor by geography or physical configuration. Such virtualized resources generally include the management of computing power and data storage. [0003] Nowadays, more and more chips can implement virtualization. The advantage of virtualization is that multiple virtual systems can run. These virtual systems have their own computing resour...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/00
CPCH04L9/002H04L9/0643H04L9/0866H04L9/0869H04L9/0891H04L9/0894
Inventor 朱华沈晓
Owner NANJING SEMIDRIVE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products