Unlock instant, AI-driven research and patent intelligence for your innovation.

Master-slave security processor

A security processor and processor core technology, applied in the field of master-slave security processors, can solve the problems of multi-core processors working together, processor hardware structure improvement, and insufficient processor security requirements. Improve business processing capability and level, and improve the effect of anti-attack

Active Publication Date: 2019-12-20
北京多思安全芯片科技有限公司 +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]The security processors on the market mainly realize the security protection of the processor through software such as encryption algorithms, without improving the internal hardware structure of the processor, making Processor security needs are not adequately met
[0004] Moreover, the current processors generally adopt a single-core structure, how to realize multi-core processors to work together is also a problem that needs to be solved in the current processor field

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Master-slave security processor
  • Master-slave security processor
  • Master-slave security processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 A schematic structural diagram of a security processor 100 according to an embodiment of the present invention is shown; the security processor 100 includes a resource controller 110 and a functional component group 120, and several functional components are arranged in the functional component group 120 and its switch configuration network; the resource controller 110 dynamically or statically configures each of the functional components into at least two processor cores (121, 122) through the control of the switches of the switch configuration network by the reorganization configuration module therein , each of the processor cores (121, 122) executes decoded instructions corresponding to configured functional components.

[0026] A functional component is a combination of logic devices capable of realizing a specific function, which includes a switch configuration network composed of a gate and a switch array. In this embodiment, a resource controller 110 is...

Embodiment 2

[0051] figure 2 A schematic diagram of a method for reconfiguring a security processor according to an embodiment of the present invention is shown. The methods include:

[0052] Step S210, setting a resource controller and several functional components in the security processor, the several functional components including a switch configuration network;

[0053] Step S220, setting a reconfiguration module in the resource controller;

[0054] In step S230, the reconfiguration module can dynamically or statically configure the functional components into at least two processor cores by controlling the switches of the switch configuration network.

[0055] According to this embodiment, the functional components in the security processor can realize the real-time and efficient reorganization of the functional components, and the functions of each processor core can be the same or different, therefore, between each processor core Functions have different emphasis and mutual backu...

Embodiment 3

[0069] Embodiment 3 provides a safety processor in a master-slave mode or an equilibrium mode or an arbitration mode, the safety processor includes a resource controller and several functional components and a switch configuration network thereof; the resource controller includes a reconfiguration module, The reconfiguration module configures the functional components into at least three processor cores by controlling the switches of the switch configuration network, and the reconfiguration module also includes a mode management unit.

[0070] The safety processor can be configured as a master-slave type, and the reconfiguration module configures the functional components to at least include a control processor core, an operation processor core and a data processor core, and each of the processor cores is assigned Different tasks, respectively realize system control, operation processing and data processing; or,

[0071] The safety processor can also be configured as a balance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a master-slave security processor. The safety processor comprises a resource controller, a plurality of functional components and a switch configuration network of the functional components. The resource controller comprises a recombination configuration module, the recombination configuration module further comprises a mode management unit, configures the functional components to comprise at least one control processor core, an operation processor core and a data processor core by controlling a switch of the switching configuration network, and different tasks are allocated to the processor cores to respectively realize the system control, the operation processing and the data processing. The functional components in the security processor are configured into at least three different processor cores and complete the same task cooperatively, so that the service processing capability and level of the security processor are greatly improved. Moreover, the securityprocessor can also realize different processor cores through the dynamic configuration, the functions of the processor cores are emphasized and are backup support for each other, and the attack resistance, the security and the reliability of the security processor can be improved through the redundancy and replaceability design.

Description

technical field [0001] The invention relates to the technical field of processor design and manufacture, in particular to a master-slave security processor capable of realizing enhanced anti-attack capability. Background technique [0002] The processor is the underlying hardware platform of all computer systems and information systems. At present, network attacks are becoming more and more normal. With the improvement of information security level, the security requirements for processors are becoming more and more common. [0003] The security processors on the market mainly realize the security protection of the processor through software such as encryption algorithms, without improving the internal hardware structure of the processor, so that the security requirements of the processor cannot be fully met. [0004] Moreover, current processors generally adopt a single-core structure, and how to implement multi-core processors to work together is also a problem that needs ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F15/177G06F21/70G06F9/50
CPCG06F15/177G06F21/70G06F9/5027
Inventor 曹春春柳会鹏李虹阳王州府魏晓伟
Owner 北京多思安全芯片科技有限公司