Secure access method, integrated circuit and computer readable storage medium

A secure access and security technology, applied in the field of communication, can solve problems such as low flexibility, inability to realize device security access control, poor security, etc., and achieve the effect of enhancing the strength of security protection and improving the ability of security access control

Pending Publication Date: 2021-10-01
CHIPSEA TECH SHENZHEN CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing MCU / SOC products, only through the security gate bridged from AHB (Advanced high-performance bus, advanced high-performance system bus) to APB (Advanced peripheral bus, advanced peripheral bus), the entire APB bus and all the devices under the bus can be controlled. Peripheral devices perform security access control, but it is impossible to implement individual security access control for individual devices on the APB bus
[0003] Therefore, it can be seen that the MCU / SOC's security access control scheme for peripheral devices in the prior art has technical defects of poor security and low flexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method, integrated circuit and computer readable storage medium
  • Secure access method, integrated circuit and computer readable storage medium
  • Secure access method, integrated circuit and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0045] figure 1It is a schematic flowchart of an embodiment of the secure access method of the present invention. In this embodiment, a secure access method is proposed, which includes the following steps:

[0046] S1. Obtain the security flag signal of the current access event and the identity information of the slave machine;

[0047] S2. Determine the target slave module to be accessed and the security attributes of the target slave module according to the slave identity information;

[0048] S3. Determine whether the security attribute ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure access method, an integrated circuit and a computer readable storage medium. The method comprises the following steps: acquiring a security mark signal of a current access event and slave identity identification information; then, determining a target slave module to be accessed and a security attribute of the target slave module according to the slave identity identification information; and finally, according to the security mark signal, judging whether the security attribute of the target slave module meets the security attribute requirement of the current access event, and if the security attribute of the target slave module does not meet the security attribute requirement of the current access event, generating a security interruption event. A more effective slave security access control scheme is realized, the individual security access control capability of each device on the bus is improved, and the security protection strength of key sensitive data is enhanced.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a safe access method, an integrated circuit and a computer-readable storage medium. Background technique [0002] In existing MCU (Microcontroller Unit, Micro Control Unit) / SOC (System on Chip, System on Chip) application scenarios, based on the purpose of information confidentiality and prevention of hacker attacks, it is necessary to protect key sensitive data, for example, in biological In scenarios such as information collection systems, vehicle electronic systems, and industrial control systems, separate and effective security access control is required for each device under the system. However, in the existing MCU / SOC products, only through the security gate bridged from AHB (Advanced high-performance bus, advanced high-performance system bus) to APB (Advanced peripheral bus, advanced peripheral bus), the entire APB bus and all the devices under the bus can be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/78G06F21/62G06F21/77
CPCG06F15/7807G06F21/6245G06F21/77
Inventor 王世好
Owner CHIPSEA TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products