Internal memory type anti-falsification processor and security method

A technology of internal memory and memory, which is applied in the direction of memory system, architecture with a single central processing unit, electrical digital data processing, etc. It can solve problems that have not been proposed, single program, and no proposal.

Inactive Publication Date: 2003-10-01
KK TOSHIBA
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in the internal memory type microprocessor, it is necessary to secure the programs under the management of the OS, but no specific method for realizing the security has been proposed.
[0016] In internal memory type processors, not only a single program but also multiple different encryption programs are simulated and processed in parallel. Although it is necessary to separately ensure the secrecy of multiple programs, there is no proposal for this.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internal memory type anti-falsification processor and security method
  • Internal memory type anti-falsification processor and security method
  • Internal memory type anti-falsification processor and security method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] figure 1 It is a schematic configuration diagram of an internal memory type tamper-resistant processor according to Embodiment 1 of the present invention. The processor 100 has a processor core 102, a cache memory module 103, a bus interface unit (BIU) 107, a firmware (ROM) 109 including a secret protection manager (secrecy management unit) 301, and an internal memory in a processor package 101. 110, which are connected to each other through an internal bus 126.

[0057] The processor core 102 has a work register 114 used by a program being executed and a task switching unit (STS: secure task switcher) 115 . The working register 114 includes an MTR (memory type range) register 401 . The MTR register 401 stores a requested protection attribute (RPA: requested protection attribute) for specifying whether a task requires privacy for an access target, that is, an internal memory area (ie, a memory page). The task switching unit 115 has a task context table 116 correspon...

Embodiment 2

[0110] In Embodiment 1, the setting of the confidentiality attribute of the internal memory is performed according to an explicit command issued by the task. In Embodiment 2, the setting of the memory security attribute is performed automatically when the memory is accessed. That is, in the state that the memory page is not kept secret (that is, the memory protection attribute MPA is 0), if the task accesses the memory in the state that requires secrecy (that is, the value of the protection attribute RPQ is 1), it will automatically be in the corresponding MPA entry Set the memory protection bit to 1 in the field. At the same time, the memory contents are initialized with random numbers. With this structure, the content security of the memory is further improved.

[0111] When accessing the memory, it is the same as the first embodiment except that the security attribute is automatically set for the target memory area. The following describes in detail the setting of the au...

Embodiment 3

[0126] In Embodiment 1 and Embodiment 2, it is explained that the microprocessor with the real address mode is used as the object, so that the security of the secret of the task and the memory management based on the OS coexist, and at the same time, the communication between the task and the OS is ensured, and the A consistent, secure approach to memory operations.

[0127] Embodiment 3 relates to an internal memory type processor having a virtual storage mechanism. In particular, prevention of memory page swapping attacks, which is a problem in processors having virtual memory structures, is described.

[0128] In a system with a virtual storage mechanism, the OS can assign an arbitrary page of physical memory to an arbitrary virtual address. In addition, this assignment can be assigned differently depending on the task. For the description of the allocation, a table on the internal main memory called a page table is used. The page table will be described later.

[0129]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The anti-tampering processor with large-capacity internal memory and the security method of the present invention can realize efficient internal data management that prevents illegal changes in a multi-task environment. The tamper-resistant processor has: a decoding unit that decodes a plurality of programs encrypted with different encryption keys; Memory; the required confidentiality attribute required by the setting task for each memory page of the access object is exclusive, and the required confidentiality attribute storage component stored; for each memory page, the memory confidentiality attribute for storing the memory confidentiality attribute of the memory page is stored Parts; when executing a task, the task is to the memory page of the access object, and the secret management part of setting the memory security attribute in the memory protection attribute preservation part; the requirement secrecy attribute stored in the requirement secret attribute preservation part and stored in the memory protection The memory protection component to which the memory protection attributes in the attribute holding component are compared.

Description

technical field [0001] The present invention relates to a large-capacity internal memory capable of accommodating multiple programs and their work areas inside the package, and can prevent unauthorized changes to the execution code and processing object data in a multi-task program execution environment. device. Background technique [0002] Open systems are widely popularized as information system networks. In an open system, information on hardware and system programs (or OS) of computers for general users such as PCs is clearly disclosed, and end users can change the system programs and make desired improvements. In such an environment, in order to protect the copyright of information processed by the application program and the copyright of the program itself, hardware that protects program secrets is necessary on the premise that the system OS can take hostile actions against the application program. Attempts to realize such hardware as a microprocessor have been prop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/10G06F21/75G06F9/46G06F12/14G06F15/78G06F21/10G06F21/12G06F21/14G06F21/60G06F21/62G06F21/86
CPCG06F12/1466G06F12/1475G06F15/16
Inventor 桥本幹生山口健作白川健治藤本谦作
Owner KK TOSHIBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products