Unlock instant, AI-driven research and patent intelligence for your innovation.

Security Device and Security Chip

A security device and chip technology, applied in the field of data security, can solve the problems of high cost, large chip area, high software and hardware development and maintenance costs, and achieve the effect of reducing maintenance costs and ensuring security.

Active Publication Date: 2021-08-10
英韧科技(南京)有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present disclosure proposes a security device and a security chip to solve the problems of high software and hardware development and maintenance costs, large chip area and high cost of existing security devices and security chips

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Device and Security Chip
  • Security Device and Security Chip
  • Security Device and Security Chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Various exemplary embodiments, features, and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.

[0040] The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as superior or better than other embodiments.

[0041] In addition, in order to better illustrate the present disclosure, numerous specific details are given in the following specific implementation manners. It will be understood by those skilled in the art that the present disclosure may be practiced without some of the specific details. In some instances, methods, means, componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a security device and a security chip. The device includes a hardware data reading module, a first security data generation module, and a hardware writing data module: the hardware data reading module is used to obtain the first register through hardware interaction The data to be processed in the first register includes registers that are not readable by software; the first safe data generation module is used to generate first safe data according to the data to be processed; the hardware write data module is used to storing the first security data in the first register through hardware interaction. The hardware interaction between the security device and the first register in the embodiments of the present disclosure ensures the security of data and reduces the maintenance cost of the security device.

Description

technical field [0001] The present disclosure relates to the technical field of data security, in particular to a security device and a security chip. Background technique [0002] With the rapid development of Internet applications, Internet of Things, and data storage, data security has received more and more attention. More and more chips and embedded systems are equipped with functions such as user authentication, key management and data encryption. All kinds of controllers and operating systems put forward higher requirements for data security. In the field of traditional data security technology, a microcontroller core is set in a security chip, and modules such as a random number generator are controlled through a secure read-write bus to interact with external systems for data. The dedicated safety bus is isolated from the external conventional system bus, and the program firmware running on the microcontroller core is specially used to implement safety-related fun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/72G06F21/73
CPCG06F21/72G06F21/73H04L2209/805H04L9/0861H04L9/0822H04L9/3247H04L9/0897H04L9/3278G06F21/31G06F21/78G06F7/58H04L9/0643H04L9/0825
Inventor 陈默扬
Owner 英韧科技(南京)有限公司