Supercharge Your Innovation With Domain-Expert AI Agents!

Design method of SoC (System on Chip) security disk control chip architecture for trusted storage

A credible and safe technology, which is applied in general stored program computers, architectures with a single central processing unit, computer security devices, etc., can solve the problem of lack of independent design capabilities, insufficient reliability of security disk control chips, and inability to implement encryption Algorithms can be dynamically configured and other issues to achieve the effect of ensuring data security, ensuring data read and write speed, and realizing bandwidth expansion

Pending Publication Date: 2020-12-15
HANGZHOU DIANZI UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In terms of Soc security disk control chips, there are still some problems in China. The main manifestations are: first, disk control chips are mostly dominated by foreign companies, and domestic companies rarely have independent design capabilities; second, security disk control chips are not reliable enough. The traditional trusted computing model is mostly used to improve the security of information storage from the host side; the third is that the security disk control chip lacks scalability, and the encryption algorithm cannot be dynamically configurable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of SoC (System on Chip) security disk control chip architecture for trusted storage
  • Design method of SoC (System on Chip) security disk control chip architecture for trusted storage
  • Design method of SoC (System on Chip) security disk control chip architecture for trusted storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions provided by the present invention will be further described below in conjunction with the accompanying drawings.

[0038] Such as figure 1 As shown, a SoC security disk control chip architecture for trusted storage includes a central processing unit 1 (CPU), a storage controller 2, an interface controller 3, a buffer 4 (SRAM), a direct access channel 5 (DMA ) and trusted module 6. Central processing unit 1 is connected with storage controller 2, interface controller 3, trusted module 6, direct access channel 5 and cache memory 4 through internal bus; cache memory 4 (SRAM) is used for data cache; direct access channel 5 (DMA) is used for direct access of data between external data and cache (Buffer). The storage controller 2 is connected to multiple flash memories through multiple flash controllers to read and write data on the hard disk.

[0039] The trusted module 6 includes a parallel hardware encryption engine 6-1, an on-chip integrated aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a design method of an SoC (System on Chip) security disk control chip architecture for trusted storage, and provides the SoC security disk control chip architecture for trustedstorage and a read-write method of the SoC security disk control chip architecture. The credibility of a security disk control chip is insufficient, a traditional trusted computing model is mostly adopted, and the security of information storage is improved from a host side. The invention discloses an SoC security disk control chip architecture for trusted storage. The SoC security disk control chip architecture comprises a central processing unit, an interface controller, a buffer and a trusted module, and the trusted module comprises a parallel hardware encryption engine. And a plurality ofencryption and decryption units are arranged in the parallel hardware encryption engine in parallel. The encryption units and the decryption units are the same in structure, and the multiple split data parts are encrypted or decrypted respectively. Through the multi-engine technology, the multiple encryption engines are used for carrying out parallel encryption processing on the data, the multi-channel control technology is used for partitioning the to-be-encrypted data, each block is subjected to independent encryption processing, and therefore bandwidth expansion is achieved.

Description

technical field [0001] The invention belongs to the technical field of hard disk data reading and writing, and in particular relates to a SoC security disk control chip architecture for trusted storage and a reading and writing method thereof. Background technique [0002] The core component to realize solid-state storage control is a solid-state storage control chip, that is, a disk control chip. There are many foreign manufacturers who have participated in the research of solid-state storage control chips, including Intel (Marvell), Seagate (Sandforce), J-Micron, Samsung, IDT, etc. However, due to the difficulty of disk control chip design technology, many technical bottlenecks cannot be effectively Many manufacturers have gradually given up research in this field and instead purchased mature chips or IP cores for system integration of solid-state storage devices. After several years of elimination, only Intel ( Marvell), Seagate (Sandforce), J-Micro, Samsung Corporation....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F15/78G06F21/60G06F3/06
CPCG06F15/781G06F21/602G06F3/0656G06F3/064G06F3/0604
Inventor 张晋玮王兴起方景龙
Owner HANGZHOU DIANZI UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More