Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Memory security detection method and system on chip

A system-on-chip and detection method technology, applied in faulty hardware testing methods, error detection/correction, faulty computer hardware detection, etc., can solve problems such as increased system overhead, difficult management, high power consumption, etc., to improve detection coverage efficiency, reduce power consumption, and improve detection efficiency

Pending Publication Date: 2021-07-23
INST OF MICROELECTRONICS CHINESE ACAD OF SCI
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the traditional memory detection methods cannot be flexibly updated according to different faults and / or attacks, and can only detect a certain type of fault or attack. If a detection scheme for multiple memory faults is to be deployed, the overhead of the system will be increased , high power consumption, and the simultaneous deployment of multiple detection circuits for multiple memory faults and / or attack detection is complex and difficult to manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory security detection method and system on chip
  • Memory security detection method and system on chip
  • Memory security detection method and system on chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the above-mentioned purpose, features and advantages of the present application more obvious and understandable, the specific implementation manners of the present application will be described in detail below in conjunction with the accompanying drawings.

[0055] In the following description, a lot of specific details are set forth in order to fully understand the application, but the application can also be implemented in other ways different from those described here, and those skilled in the art can do it without violating the content of the application. By analogy, the present application is therefore not limited by the specific embodiments disclosed below.

[0056] As described in the background art, with the rapid development of IoT technology, IoT devices are widely used. Users use IoT devices to make life convenient and fast. IoT devices rely on users to provide users with various services while collecting their personal information.

[0057]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a memory security detection method and a system on chip, the system on chip comprises a security policy controller and a memory to be detected, and the security policy controller comprises a detection module. The security policy controller receives a detection signal which carries a to-be-detected fault and / or an attack identifier of the to-be-detected memory, and obtains a detection algorithm corresponding to the to-be-detected fault and / or the attack identifier from the off-chip memory according to the to-be-detected fault and / or the attack identifier; and the off-chip memory stores detection algorithms corresponding to various fault and / or attack identifiers, the detection module is configured according to the obtained detection algorithms to obtain a detection circuit, and the detection circuit is utilized to judge whether the to-be-detected memory has a to-be-detected fault and / or attack. Security detection of corresponding faults and / or attacks of the to-be-detected memory is achieved, multiple complex detection circuits do not need to be deployed in the system at the same time, corresponding detection algorithms are called according to different detection signals to configure the corresponding detection circuits, power consumption is reduced, and efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of hardware security, in particular to a memory security detection method and a system on chip. Background technique [0002] With the rapid development of IoT technology, IoT devices are widely used. Users use IoT devices to make life convenient and fast. IoT devices rely on users to provide users with various services while collecting their personal information. [0003] The system-on-chip is the hardware foundation of IoT devices, and memory is an important part of the system-on-chip. If the memory fails or is attacked by hardware Trojan horses, etc., it will lead to changes in the functions of IoT devices, or leak users’ personal information, or even bring losses to users. [0004] In order to ensure the safety of the memory, it is necessary to perform memory safety testing to detect faults and give an alarm in time. Most of the traditional memory detection methods cannot be flexibly updated...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/22
CPCG06F11/2205G06F11/2273
Inventor 李莹王建陈岚
Owner INST OF MICROELECTRONICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products