Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CPU instruction protection method and system suitable for function and information security chip

An information security and instruction technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of system errors, inability to actively detect hacker attacks, and inability to detect, and achieve the effect of ensuring information security

Active Publication Date: 2020-07-31
NANJING SEMIDRIVE TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing protection methods cannot detect and locate random errors generated during instruction storage, reading, decoding, and execution.
In the existing way, random errors will only be executed directly with the reading, decoding, and execution of instructions, resulting in erroneous behavior in the system
Existing protection mechanisms cannot actively detect hacker attacks, and information security is also difficult to guarantee
[0005] CPU technology and its instruction architecture and compiler technologies are developing rapidly, and the protection technology of CPU and its instructions is also constantly being updated. However, since chips that support functional safety and information security protection are required at the same time, how to protect the CPU and its instructions There is currently no mature technology to learn from the system approach

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CPU instruction protection method and system suitable for function and information security chip
  • CPU instruction protection method and system suitable for function and information security chip
  • CPU instruction protection method and system suitable for function and information security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose and technical solutions of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings of the embodiments of the present invention. Apparently, the described embodiments are some, not all, embodiments of the present invention. Based on the described embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0046] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meaning as commonly understood by those of ordinary skill in the art to which this invention belongs. It should also be understood that terms such as those defined in commonly used dictionaries shoul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a CPU instruction protection method and system suitable for a function and information security chip. According to the invention, a hash function is utilized to generate an encoding random value and a corresponding decoding random value, and the encoding random value and the original instruction or the encoding instruction value are utilized to perform encoding operation ordecoding operation, so that recoding and decoding of an instruction are correspondingly realized. The output of each round of hash function comprises the information of each previous round of instruction, so that an error in any step will influence all subsequent encoding and decoding processes. Therefore, the encoding random value and the decoding random value among the instructions have corresponding continuity, the exception occurring in any step can be continued to the subsequent steps, so that the detection of the function security and the information security of a chip is realized, the instructions can be recoded and compared after being executed, and the function security and the information security of the CPU instruction storage, reading, decoding and execution processes are protected.

Description

technical field [0001] The invention relates to the technical field of chip security, in particular to a CPU instruction protection method and system suitable for function and information security chips. Background technique [0002] CPU (central processing unit, central processing unit) is the computing and control core of the computer system. CPU instructions are the instructions and commands to direct the machine to work. The program is a series of instructions arranged in a certain order. The process of executing the program is the working process of the computer. . [0003] At present, most CPUs need to go through a series of processes of instruction storage, reading, decoding, and execution to execute instructions. Each step in these processes has a certain probability of encountering random errors, which can lead to functional safety issues. During the operation of the equipment, there are also information security issues caused by hackers. Therefore, the CPU instr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71
CPCG06F21/71
Inventor 朱华
Owner NANJING SEMIDRIVE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products