Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method and system based on security chip and security chip

A security chip and security certification technology, applied in the field of secure communication, can solve problems affecting and affecting information security, and achieve the effect of improving information security and increasing the cost of cracking

Active Publication Date: 2020-03-24
ZHEJIANG GEOFORCECHIP TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, external attackers can choose to observe the communication authentication process, adopt energy analysis attacks, or use special equipment, self-made equipment, exploit security chip design loopholes or software defects, and use various technical means such as FIB to break through the encryption protection of the chip. , and extracting key information from the inside of the chip, obtaining software programs and security authentication keys, seriously affects information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and system based on security chip and security chip
  • Security authentication method and system based on security chip and security chip
  • Security authentication method and system based on security chip and security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] see figure 1 The security authentication system 1 of the present invention includes a host computer 10 and a security authentication device 11 coupled to the host computer 10; the security authentication device 11 includes a security chip 2 coupled to the host computer 10 and an auxiliary chip 3 coupled to the security chip 2 .

[0053] see figure 2 , the security chip 2 includes an MCU core unit 20, a volatile storage unit 21, a nonvolatile storage unit 22, an I / O interface 24, and a high-speed hardware algorithm unit; wherein, the high-speed hardware algorithm unit includes a high-speed hardware algorithm unit 231, a high-speed hardware algorithm unit A plurality of high-speed hardware arithmetic units such as the hardware arithmetic unit 232 and the high-speed hardware arithmetic unit 233 . The MCU core unit 20 is mainly used for internal control and calculation of the chip, usually a general-purpose MCU core such as MSP430, CORTEX-M0; the volatile storage unit 21...

Embodiment 2

[0104] In the description of this embodiment, only the difference between the information processing processes of the two chips is described as an example, that is, only the difference from the above-mentioned embodiment 1 is described, and the symbols of each unit continue to be used in embodiment 1. label.

[0105] In the non-volatile storage unit 32 of the auxiliary chip 3, the security key information that has already been encrypted is stored, that is, the first ciphertext data in Embodiment 1 is stored, and is used to decrypt the first ciphertext data. The first decryption key is pre-stored in the non-volatile storage unit 22 of the security chip 2 .

[0106] That is, in this embodiment, the first ciphertext data is generated by encrypting the security key data required for security authentication, and the key required for its decryption is the aforementioned first decryption key, without the need for the security chip 2 to generate the first random key. Number and perfo...

Embodiment 3

[0109] In the description of this embodiment, only the difference between the information processing processes of the two chips is described as an example, that is, only the difference from the above-mentioned embodiment 1 is described, and the symbols of each unit continue to be used in embodiment 1. label.

[0110] After the auxiliary chip 3 receives the wake-up instruction, it generates a pair of public key and private key based on the asymmetric encryption and decryption algorithm, the private key is stored in the volatile storage unit 31, and the public key is sent to the security chip 2, specifically , the public key can be used as the response information for the wake-up command. The security chip 2 uses the public key to encrypt the first random number using an asymmetric encryption and decryption algorithm to obtain the second ciphertext data and send it to the auxiliary chip 3. The chip uses the private key stored in the volatile storage unit 31 to decrypt, and then ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security authentication method and system based on a security chip and the security chip, and belongs to the technical field of security communication. The security authentication method comprises the steps that (1) a security chip sends a key acquisition request to an auxiliary chip in response to a security authentication request sent by an upper computer; (2) the auxiliary chip sends first ciphertext data encrypted by the security key to the security chip in response to the key acquisition request; and (3) the security chip decrypts the first ciphertext data to obtain a security key, and performs security authentication with the upper computer in combination with the code table data stored in the security chip. A security key and code table data required by security authentication are separately stored in a security chip and an auxiliary chip, so that the chip cracking difficulty is increased, the information security is improved, and the method can be widely applied to the field of communication and authentication equipment.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to a security chip-based security authentication method and system and the security chip. Background technique [0002] In the field of secure communication technology, in order to provide reliable secure communication protection for Internet of Things (IOT) markets such as home automation, industrial networking, accessories and consumables verification, medical care, and mobile, many manufacturers have adopted encryption countermeasures and security authentication functions. Security chip to effectively provide excellent confidentiality, data integrity and authentication functions for those systems where MCU or MPU runs encryption / decryption algorithms such as ECC in software. [0003] Such as figure 1 Shown is the basic structure of the security chip 2, which mainly includes an MCU core unit 20, a volatile storage unit 21, a non-volatile storage unit 22, a high-speed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/34
CPCG06F21/34
Inventor 王敏陈志业
Owner ZHEJIANG GEOFORCECHIP TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products