Master-slave security processor
A security processor and processor core technology, applied in the field of master-slave security processors, can solve the problems of multi-core processors working together, processor hardware structure improvement, and insufficient processor security requirements. Improve business processing capability and level, and improve the effect of anti-attack
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] figure 1 A schematic structural diagram of a security processor 100 according to an embodiment of the present invention is shown; the security processor 100 includes a resource controller 110 and a functional component group 120, and several functional components are arranged in the functional component group 120 and its switch configuration network; the resource controller 110 dynamically or statically configures each of the functional components into at least two processor cores (121, 122) through the control of the switches of the switch configuration network by the reorganization configuration module therein , each of the processor cores (121, 122) executes decoded instructions corresponding to configured functional components.
[0026] A functional component is a combination of logic devices capable of realizing a specific function, which includes a switch configuration network composed of a gate and a switch array. In this embodiment, a resource controller 110 is...
Embodiment 2
[0051] figure 2 A schematic diagram of a method for reconfiguring a security processor according to an embodiment of the present invention is shown. The methods include:
[0052] Step S210, setting a resource controller and several functional components in the security processor, the several functional components including a switch configuration network;
[0053] Step S220, setting a reconfiguration module in the resource controller;
[0054] In step S230, the reconfiguration module can dynamically or statically configure the functional components into at least two processor cores by controlling the switches of the switch configuration network.
[0055] According to this embodiment, the functional components in the security processor can realize the real-time and efficient reorganization of the functional components, and the functions of each processor core can be the same or different, therefore, between each processor core Functions have different emphasis and mutual backu...
Embodiment 3
[0069] Embodiment 3 provides a safety processor in a master-slave mode or an equilibrium mode or an arbitration mode, the safety processor includes a resource controller and several functional components and a switch configuration network thereof; the resource controller includes a reconfiguration module, The reconfiguration module configures the functional components into at least three processor cores by controlling the switches of the switch configuration network, and the reconfiguration module also includes a mode management unit.
[0070] The safety processor can be configured as a master-slave type, and the reconfiguration module configures the functional components to at least include a control processor core, an operation processor core and a data processor core, and each of the processor cores is assigned Different tasks, respectively realize system control, operation processing and data processing; or,
[0071] The safety processor can also be configured as a balance...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


