Unlock instant, AI-driven research and patent intelligence for your innovation.

A data and command security analysis risc processor circuit and method thereof

A processor circuit and security technology, applied in the direction of electrical digital data processing, digital data authentication, digital data protection, etc., can solve the problems of unsafe programs, redundant attacks, and port authentication is difficult to cover data and commands, and achieves The effect of improving safety performance and ensuring safety

Active Publication Date: 2021-06-04
ZHEJIANG GEOFORCECHIP TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The computer equipment exchanges data and commands with the outside world through wired or wireless ports, so the security authentication device of the computer equipment performs security authentication on the data and commands entering and exiting the port to confirm the security of the data and commands and compliance with the authority requirements; however, relying solely on Port-level authentication cannot guarantee the security of computer equipment. For example, redundant attacks can be launched on computer equipment by sending a large number of compliant data and commands until the port authentication of computer equipment is paralyzed; and port authentication is also difficult to cover all incoming and outgoing ports. data and commands
Scanning authentication conducts a comprehensive scan on the external devices connected to the computer, but the data and programs on the external devices are dynamic, and it is difficult to avoid deriving unsafe programs and generating unsafe data and commands during the operation process. Scanning external devices It is also often restricted by various permissions and it is difficult to achieve full coverage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data and command security analysis risc processor circuit and method thereof
  • A data and command security analysis risc processor circuit and method thereof
  • A data and command security analysis risc processor circuit and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purposes, technical solutions and advantages of the implementation of this application clearer, the following will be combined with the appended figure 1 Referring to the accompanying drawings, the technical solutions in the embodiments of the present application are described in more detail.

[0040]The invention provides a data and command security analysis RISC processor circuit and method thereof. In the present invention, a special-purpose RISC processor circuit based on a simplified instruction set is installed in the computer equipment, and the RISC processor circuit can carry out encrypted communication with the wired or wireless port of the computer equipment; Then, when the outside world needs to interact with the computer equipment for data and commands, it first initiates a security authentication request to the RISC processor circuit each time, and the RISC processor circuit According to the request items of the security certification ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a data and command security analysis RISC processor circuit and a method thereof. The state switching of each step of the computer equipment process has passed the above-mentioned safety evaluation of the RISC processor circuit, and the results of the safety evaluation are reflected in the tag value corresponding to the stack position of the RISC processor circuit tag stack. After the circuit obtains the tagged value array after the signature, it can verify whether each step of the program process from startup to Mn is in a safe state, thereby ensuring security and avoiding data and programs from being generated during dynamic operation. Safe data and commands improve the security performance of the computer interaction process.

Description

technical field [0001] This application relates to the field of chip technology, in particular to a data and command security analysis RISC processor circuit and its method. Background technique [0002] For a computer device, due to various functional requirements, there must be frequent data and command interactions with the outside world. In this process, the risk of information security is undoubtedly increased. Computer equipment may obtain unsafe data and commands from the outside world. These data and commands may break through permissions and hijack computer equipment. Information may also cause abnormalities and damages to computer hardware, or waste computer resources to implement redundant attacks. [0003] In order to avoid the above situation, it is necessary to perform security authentication for data and commands input from the outside to the computer device. Currently, security authentication methods are mainly port-level authentication and scanning authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F21/57G06F21/60G06F21/64
CPCG06F21/45G06F21/57G06F21/602G06F21/64
Inventor 不公告发明人
Owner ZHEJIANG GEOFORCECHIP TECH CO LTD