Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data protection device aiming at energy attack and use method

A data protection and energy technology, applied in the field of data security, can solve the problems of unreliable filter capacitors and inability to protect data, and achieve the effect of avoiding energy attacks

Inactive Publication Date: 2022-06-03
北京密码云芯科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned method of adding filter capacitors is not reliable, and it will not be able to play a role in data protection in the face of attacks from high-precision energy attack devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection device aiming at energy attack and use method
  • Data protection device aiming at energy attack and use method
  • Data protection device aiming at energy attack and use method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

In view of the above shortcomings, the embodiments of the present invention propose a data protection device against energy attacks, such as figure 1 and figure 2 shown, including:

In the current sampling module 1, its first output terminal is electrically connected to the input terminal of the sampling amplifying module 2, and its second output terminal is electrically connected to the input terminal of the device load 8, so as to convert the current signal into a sampled voltage signal; Add sampling resistor R in current sampling module 1 取 , thereby converting the current signal into a sampled voltage signal.

[0021] In a preferred embodiment, the current sampling module 1 includes a sampling resistor R 取 and with the sampling resistor R 取 Parallel low-pass filter;

Sampling resistor R 取 The two ends are respectively connected to the first power supply V 1 with the first ground wire GND 1 , the low-pass filter includes a first resistor R connected in series 1 , t...

Embodiment 2

Based on the first embodiment, this embodiment of the present invention specifically provides a specific implementation manner of a data protection device.

[0036] Among them, the sampling resistance R 取 The resistance value is 0.01Ω, the signal amplification chip U 1 A fixed magnification M of 150 was used. For current sampling module 1, the first power supply V 1 is 12V, sampling resistor R 取 The smaller the value of , the smaller the influence on the current in the data protection device.

[0037] For sampling amplifying module 2, the fourth power supply V 4 The voltage value is 3.3V, the third capacitor C 3 The role lies in the fourth power supply V 4 filter, while the fourth capacitor C 4 Used to filter the amplified sampled voltage signal to eliminate interference.

[0038] The reference signal unit 32 uses the fifth resistor R 5 , the sixth resistor R 6 and the seventh resistor R 7 on the second power supply V 2 Divide the voltage to obtain the reference vol...

Embodiment 3

On the basis of Embodiment 1 and Embodiment 2, an embodiment of the present invention further provides a method for using a data protection device against energy attacks, which is applied to a processor corresponding to the above data protection device, such as image 3 shown, including:

S01: Acquire the setting parameters of the data protection device; it should be noted here that, before performing step S01, the setting parameters need to be configured by performing operations such as program programming on the processor. The specific parameters include the reference current I_vref, and the reference current signal is usually set with a safety threshold of ±5%.

[0041] The above setting parameters can be adjusted. The adjustment method includes but is not limited to reading the current sampling current signal I 1 and stored as the reference current I_vref.

[0042] S02: Real-time acquisition and conversion of the digital voltage signal sent by the A / D conversion module; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data protection device aiming at energy attack and a use method, the device comprises a current sampling module, a first output end is connected with a sampling amplification module, and a second output end is connected with a device load; a first output end of the sampling amplification module is connected with the signal cache module, and a second output end is connected with the dead load control module; the signal caching module is connected with the A / D conversion module; the dead load control module is connected with the switch module; the output end of the switch module is connected with a device load; and an A / D conversion module. According to the data protection device aiming at the energy attack and the using method, the current flowing into the device load is sampled through the current sampling module and converted into the voltage value, then the voltage value is amplified through the sampling amplification module, the dead load control module is used for comparing with the reference voltage signal, and the data protection effect is achieved. Therefore, the current flowing into the device load is controlled, the power consumption of the device load is kept unchanged, energy attack is avoided, and a data protection effect is achieved.

Description

technical field [0001] The invention relates to the technical field of data security, and in particular, to a data protection device against energy attacks and a method for using the same. Background technique [0002] Energy (analysis) attack refers to obtaining its key by analyzing the energy consumption of the cryptographic device. For example, by analyzing the power consumption of the cryptographic device, the operation rules of the cryptographic device can be obtained, and the sensitive data can be analyzed to achieve the effect of the attack. [0003] At present, the method of encryption equipment against energy attacks is to add filter capacitors at the power supply of encryption equipment to reduce the possibility of attackers capturing changes in equipment power consumption. However, the above method of adding filter capacitors is unreliable, and will not be able to play a role in data protection in the face of high-precision energy attack devices. SUMMARY OF THE ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/60
Inventor 李国瑞孙悦孙马秋武长龙宋咏超
Owner 北京密码云芯科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More