Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection unit applicable to embedded system

An embedded system, data protection technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve the problem of difficulty in establishing the connection between plaintext and ciphertext, and achieve easy expansion, high security, and reasonable design. Effect

Active Publication Date: 2011-04-06
FUDAN UNIV
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Without knowing the key, it is difficult to establish the link between plaintext and ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection unit applicable to embedded system
  • Data protection unit applicable to embedded system
  • Data protection unit applicable to embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention implements a data protection unit 7 suitable for embedded systems, which will be further described below in conjunction with the accompanying drawings.

[0032] The embedded system includes a processor unit 1, a cache memory 2 and an off-chip memory 3. By adding an encryption and decryption control unit 4, a symmetric encryption operation unit 5 and a summary operation unit 6 in the embedded system, the confidentiality of software and data is realized and integrity verification.

[0033] Using the method of command customization, by configuring the encryption and decryption control unit 4, the entire data protection unit 7 can work in four modes, which are respectively:

[0034] No protected mode. It does not provide data confidentiality and integrity verification, and is generally used in occasions that do not require high program security. The system performance is the best in this mode.

[0035] Confidentiality verification mode. Provides dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of design of integrated circuits, in particular to a data protection unit applicable to an embedded system. The embedded system comprises a central process, a high-speed cache and a chip memory. The system also has a decryption control unit, a symmetric encryption operation unit and an abstract operation unit for protecting the security and integrity of data. In an operation process, the system flexibly configures different operation modes according to requirements on security level and performance. The data protection unit is easy to expand and has a high promotion value. By introducing the data protection unit, the security of the embedded system is improved considerably enough to prevent software pirating by software copying and effectively prevent vicious software tamper.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit design, and in particular relates to a data protection unit circuit suitable for an embedded system. Background technique [0002] As mobile devices are more and more widely used in people's lives, security issues in the embedded field have become more prominent. On the one hand, the scale of software on embedded platforms is often small, and illegal copying and dissemination of software is easier to realize, which seriously infringes the economic interests of software developers. On the other hand, malicious software modification may lead to the leakage of key data, or even The entire system is paralyzed, causing serious user losses. With the help of software methods, dynamic (or static) embedding of verification codes in software can effectively prevent some software hazards, but software methods are highly targeted and often helpless against new attacks, which will greatly increase ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/60
Inventor 韩军张随欲李辉楷曾晓洋
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products