Supercharge Your Innovation With Domain-Expert AI Agents!

Embedded security module system

A security module and embedded technology, applied in response to error generation, digital data authentication, digital data protection, etc., can solve the problems of embedded devices or systems with poor risk resistance, and achieve strong resistance to power consumption analysis and electromagnetic analysis Effect

Pending Publication Date: 2022-04-26
中电华瑞技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For this reason, the present invention provides an embedded security module system to solve the problem of poor risk resistance of existing embedded devices or systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded security module system
  • Embedded security module system
  • Embedded security module system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment discloses an embedded security module system, the security module of the system has functions such as file system, data I / O, data encryption and decryption, data signature and verification, key generation, true random number generator, etc. The security function of the module can be invoked externally through the APDU command, which can provide security protection for information transmission in the field of regional comprehensive energy management and energy Internet of Things.

[0028] The HRT6701 embedded security module adopts a 32-bit CPU core with high security, high performance and low power consumption. The maximum operating clock supports 67.5MHz, the operating voltage is 1.62V-5.5V, the maximum operating current is less than 7mA, and the sleep current is less than 80uA. Configure 384K ROM as the storage of infrequently changing data such as driver programs and function libraries, and have 192KB EEPROM storage space for storing COS codes and data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded security module system, a security module of the system has the functions of data I / O, a file system, data encryption and decryption, data signature and signature verification, key generation, a true random number generator and the like, and the security function of the module can be called externally through an APDU command message. The invention provides a solution for information security assurance in the field of regional comprehensive energy management and energy internet of things.

Description

technical field [0001] The invention relates to the technical field of security chips, in particular to an embedded security module system. Background technique [0002] With the development of electronic science and computer technology, more and more embedded devices have entered people's lives, and gradually play an important role in system automatic control and data storage in many fields. At the same time, more and more applications and more convenient network access make embedded platforms face more and more security challenges. Embedded systems have strict resource constraints in terms of computing power, memory, and energy. Using virus scanning and anti-intrusion software on general-purpose computers to defend against security attacks will result in reduced performance and increased power consumption. Therefore, the security problems of embedded systems are more challenging than those of general-purpose systems. [0003] The ultimate goal of security attacks is to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/45G06F21/60G06F21/64G06F11/10G06F11/14
CPCG06F21/45G06F21/602G06F21/64G06F11/1004G06F11/1448G06F2221/2107
Inventor 沙舟靳冬张胜华
Owner 中电华瑞技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More