Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information processing unit

A technology of information processing device and computing device, which is applied in the direction of secure communication device, electrical digital data processing, code identification card or credit card activation, etc., which can solve the problems of low correlation and difficulty in analyzing attacks, etc.

Inactive Publication Date: 2005-05-25
RENESAS ELECTRONICS CORP
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since by using this method, the correlation between the power consumption during data transmission and the transmission data can be low or non-existent, the power consumption analysis attack becomes significantly difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing unit
  • Information processing unit
  • Information processing unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0129] first use Figure 4 , 5 , 6 describe an embodiment of mapping a physical address according to (Formula 1) and its operation.

[0130] First, show the simplest M=2 m An embodiment of the occasion of the form of (2 to the m power).

[0131] Figure 4 The illustrated embodiment of the invention consists of the following components. That is to say, its structure includes a buffer 401 for program counting, a random number generator 402, a buffer 403 for random numbers, an adder 404, and storage 2 m Buffer (PC) 405 of -1=M-1 (m 1s are paralleled in binary representation), circuit 406 for calculating logical product (logical AND), physical address buffer 407, and whether the position of the program counter is determined to be in the specified area The decision circuit 408 , the selector 409 , the zero buffer 410 , the start address buffer 411 , the subtractor 412 and the end address buffer 413 . Here, the value 0 is stored in the zero buffer. Since this is a fixed value...

Embodiment 2

[0143] The following describes an embodiment in which the simplest scrambling effect in the correspondence between physical addresses and logical addresses is high. Assume that the number of bits of the address is n. Usually, memory differs by the high order bits of the address. In this embodiment, for the sake of simplicity, it is assumed that the entire RAM area is an area in which the most significant bit is 1. That is, the RAM area has 2 n-1 Bit-sized regions.

[0144]This embodiment consists of the following parts. That is, a buffer 701 for program counting, a random number generator 702, a buffer 703 for random numbers, a judging circuit 704 for judging whether the position of the program counter is in a specified area, a selector 705, a zero buffer 706, and a circuit for calculating an exclusive OR value circuit 707 and physical address buffer 708 . Here, the value 0 is stored in the zero buffer. Since this is a fixed value, it doesn't need to be a register, for s...

Embodiment 3

[0149] In the present invention, security can be further improved by using a combination of configuration data and a technique of changing the address to a certain value. For example, it can be considered that by applying the method of the present invention to the area that becomes the target of DPA attack in RAM, for the part that becomes the target of the attack method that directly observes and extracts internal information without using statistical methods, the data is allocated so that the address As long as the change is fixed, a wider range of internal data can be safely processed, and security can be improved.

[0150] This embodiment, for example, is as follows.

[0151] Currently, the address of the RAM area is from C000 to CFFF in hexadecimal notation. Next, in the extended example of M shown in Embodiment 1 above, an information processing apparatus applied to the area from C900 to CFFF will be considered. Under this condition, consider the following procedure. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an information processing device. An object of the present invention is to provide a tamper-resistant information processing device for an IC card or the like having high security. In the present invention, by providing a program storage unit for storing programs, a memory for storing data, an arithmetic device for performing predetermined processing according to the program, and a data bus for connecting the arithmetic device and the memory, the arithmetic device has logical addresses and The above-mentioned problems are solved by an information processing device of a conversion unit that converts a physical address of the memory that is randomly set every time a logical address is calculated or every time the information processing device is started.

Description

technical field [0001] The present invention relates to a tamper-resistant information processing device with high security, and particularly relates to an extremely effective technology applicable to IC cards. [0002] The present invention relates to an anti-interference information processing device capable of preventing reading and analysis of processing information generated by power consumption analysis and hardware inspection in the information processing device. In addition, it also relates to a fault-tolerant anti-interference information processing device that can detect data changes and tampering caused by attacks during data recording and reading, or can automatically restore data changes and tampering. In particular, it relates to a monolithically integrated information processing device typified by an IC card (smart card) in which such a function is essential. Background technique [0003] The IC card is a device for storing personal information that cannot be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/00G06F12/02G06F12/04G06F12/14G06K19/073G07F7/10H04L9/00
CPCG06F12/1408H04L9/003H04L9/004H04L2209/127
Inventor 神永正博渡边高志远藤隆
Owner RENESAS ELECTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products