FPGA + processor architecture-based information security system and working method thereof

A technology of information security system and processor architecture, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problem that core data and key application codes are easy to be stolen, embedded computers lack confidentiality measures for information security, etc. question

Pending Publication Date: 2021-02-26
XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides an information security system based on FPGA+processor architecture and its working method, so as to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • FPGA + processor architecture-based information security system and working method thereof
  • FPGA + processor architecture-based information security system and working method thereof
  • FPGA + processor architecture-based information security system and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0043] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0044] For the existing encryption protection method, only the logic code in the FPGA is protected, but the protection of the application program in the computer cannot be provided. The embodiment of the present invention is an information security system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an FPGA + processor architecture-based information security system and a working method thereof. The system comprises an FPGA, a general processor and a memory, wherein the FPGA is interconnected with a processor and a FLASH; the memory is used for power-on configuration of the FPGA and storage of software programs, and the stored software comprises an encryption bootstrapprogram and an encryption application program; the FPGA is used for decrypting the encrypted bootstrap program stored in the memory, and is also used for generating a ciphertext for decrypting and encrypting the application program by the processor through the encryption software running the application program key; and the processor is used for running the bootstrap program decrypted by the FPGAand running the decrypted application program. According to the embodiment of the invention, the problem that core data and key application program codes are easy to steal due to lack of information security confidentiality measures in the existing embedded computer is solved.

Description

technical field [0001] The present invention relates to but not limited to the technical field of embedded computer information security, especially an information security system based on FPGA+processor architecture and its working method. Background technique [0002] Cryptography technology is the leading force to ensure information security, and the research and application of cryptographic algorithms is the core research field of information security technology. Currently published national secret algorithms include: SM1 symmetric algorithm, SM2 asymmetric algorithm, SM3 hash (Hash) algorithm, SM4 block encryption algorithm. [0003] At present, some new FPGA chips integrate bit stream decryption logic to provide a high degree of design security. Without knowing the encryption key, would-be pirates cannot analyze the externally intercepted bitstream to understand or clone the design. For example, the 7 series FPGA produced by Xilinx can guarantee that the design canno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/71G06F21/76G06F9/4401H04L9/08H04L9/14
CPCG06F21/71G06F21/76G06F9/4401H04L9/0861H04L9/0894H04L9/14H04L2209/12Y02D10/00
Inventor 楚要钦刘小剑施辰光裴静静刘永强高浩
Owner XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products