Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Memory data protecting device and LSI for IC card

A data protection and storage technology, applied in memory systems, electrical digital data processing, instruments, etc., can solve problems such as illegal actions, cannot guarantee data security status, etc., and achieve the effect of reliable access control

Inactive Publication Date: 2007-12-05
PANASONIC CORP
View PDF1 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the technology described in the above-mentioned Japanese Patent Application Laid-Open No. 2005-25340, since the generation of the access control signal is prohibited so that the memory cannot be accessed, when illegal access such as illegal reading or writing occurs, the data stored in the Although the data in the memory cannot be read or written, there is a possibility that the protected storage area is judged to be an important data area storing security data, and the location of the important data area may be identified
When the location of the important data area is identified, the security data stored in the memory can be tampered with by probing the memory, and the LSI can be made to act illegally and analyze it, so it cannot be said that the data is guaranteed to be in the security status

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory data protecting device and LSI for IC card
  • Memory data protecting device and LSI for IC card
  • Memory data protecting device and LSI for IC card

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0034] FIG. 1 is a flowchart showing a schematic processing flow of a memory data protection method of a memory data protection device according to a first embodiment of the present invention.

[0035] In the figure, when an execution program to be executed by the CPU accesses data in the memory (step S1), the access authority of the execution program to secure data in the memory is judged (step S2). Here, in the ROM of the memory data protection device of the present invention, API programs such as library files with access authority to the security data and OS programs such as application programs without the access authority are stored. In the above-mentioned step S2, it is judged Whether the execution program read by the CPU from the ROM is any one of the above-mentioned API program and the above-mentioned OS program, and judges the access authority.

[0036] According to the access authority of the above-mentioned execution program judged in the above-mentioned step S2 an...

no. 2 example

[0063] FIG. 4 is a block diagram showing the overall structure of a memory data protection device according to a second embodiment of the present invention.

[0064] The memory data protection device 200 of this embodiment differs from the memory data protection device 100 of the first embodiment shown in FIG. 3 only in that the storage space 150 has a register 250 for illegal access. The description of other structures is omitted since they are the same as those of the first embodiment.

[0065]A preset random number is stored in the illegal access register 250 provided in the storage space 150 . When the access permission judgment circuit 141 in the access control unit 140 judges that the access is illegal, the storage space address decoding circuit 142 changes the mapping of the logical address of the security data to be accessed by the execution program into the physical address assigned to the above-mentioned register 250 for illegal access. , and output the physical add...

no. 3 example

[0071] FIG. 5 is a block diagram showing the overall structure of a memory data protection device according to a third embodiment of the present invention.

[0072] The only difference between the memory data protection device 300 of this embodiment and the memory data protection device 100 of the first embodiment shown in FIG. As for other structures, since they are the same as the memory data protection device of the first embodiment, their descriptions are omitted.

[0073] When the access permission judging circuit 141 in the access control unit 140 determines that the access is illegal, the storage space address decoding circuit 142 transmits the logical address of the secure data to be accessed by the program execution to the memory control circuit 350 .

[0074] When the access to the safety data of the above-mentioned execution program is a write processing access, according to the memory control signal MCS input from the CPU 11 and the memory of the logical address of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data protecting device for the storing device, which sets illegal visiting used area in the memory space, and allocates physical addresses to the illegal visiting used area. In the visiting authority judging part and the visiting judging circuit, it judges the visiting to the safe data which is to be executed by the CPU is normal visiting or illegal visiting. When the visiting is judged to be illegal visiting, it modifies the logical address mapping of the safe data which is to be visited to the physical address of the illegal visiting used area. Afterwards, it does data treatment to the illegal visiting used area when the mapping is modified. Therefore, when illegal visiting happens, the location of the important area where the safety data is stored is not identified, and thereby it can protect the safety data.

Description

technical field [0001] The present invention relates to a memory data protection device and an IC card LSI for improving security functions by controlling access to a memory storing security data such as an LSI used in an IC card. Background technique [0002] LSIs for IC cards equipped with memories storing security data are used in electronic train tickets, credit cards, etc. [0003] ROM, SRAM, and nonvolatile memory are usually installed in LSIs for IC cards. Among them, ROM stores application programs and control programs, SRAM temporarily stores data generated during operation, and nonvolatile memory retains data even when the power is turned off. These memories store data such as personal privacy information and financial information, so ensuring security is an important issue. [0004] Conventionally, as a semiconductor integrated circuit with improved security functions, there is, for example, the technology described in Japanese Patent Application Laid-Open No. 20...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/60G06F21/62G06F21/75G06F21/79
CPCG06F12/1441
Inventor 角和宪
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products