Method and device for reconstructing hardware secret key of memory
A memory and secret key technology, applied in the field of data security, can solve problems such as changes in the bias of storage units, and achieve the effect of improving the success rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.
[0068] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. The IoT device includes a CPU and a memory, and the CPU can obtain the hardware key of the memory as the key of the IoT device. The IoT device can use the hardware key to perform operations such as data encryption or device authentication during communication with the server. When the CPU acquires the hardware key, it can determine it by using the recorded location information and rollover probability of the storage unit in the memory. In the embodiment of this specification, the aforementioned Internet of Things device is only a specific device implementation, and in practical applications, any other device including a CPU and a memory may be used instead.
[0069] For physical entities such as Internet of Things devices, smart ca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


