Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fingerprint safety chip

A security chip and chip technology, applied in the field of information security, can solve the problems of shared resource attacks, no protection mechanism, hindering performance improvement, etc., to achieve the effect of data security assurance, high security, and isolation.

Inactive Publication Date: 2016-04-27
DATANG MICROELECTRONICS TECH CO LTD +1
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The fingerprint recognition operation process is placed in the main system, sharing the storage space and running space of the same chip with other applications, that is, physically sharing the flash memory (Flash) and random-access memory (RAM, Random-AccessMemory) of the same chip ), which is assigned and controlled by software applications; however, this scheme has the following disadvantages: the fingerprint algorithm software is stored in the general storage space of the system, and is easily attacked or copied by other application software; the processing process of fingerprint image data is in the general RAM space, which is easy to Theft or forgery; the transmission of the fingerprint comparison results is interacted by the software inside the same chip, and there is a risk of being stolen or tampered with;
[0005] (2) The fingerprint recognition operation process is placed in the trusted execution environment (TEE, Trusted execution environment). This scheme is based on the TEE architecture. Although it uses the FLASH and RAM of the main control chip physically, it is provided by the TEE at the operating system and the underlying access level. Isolation protection; however, this scheme has the following disadvantages: TEE is at risk of being attacked by shared resources; there are loopholes in certificate processing or signature validity period in the secure boot code, allowing hackers to insert malicious code; Insert malicious code to obtain fingerprint information;
[0006] (3) The fingerprint recognition operation process is placed in an independent embedded chip, and a dedicated fingerprint algorithm chip is used to physically isolate the processing and storage of fingerprint sensitive data from the main system; however, this solution has the following disadvantages: general micro control unit (MCU, MicrocontrollerUnit)'s Flash and static random access memory (SRAM, StaticRandomAccessMemory) have no special protection mechanism, and there is a risk of being compromised; the operation of the algorithm has no independent encryption and decryption space, and information is easy to be stolen;
[0007] (4) The chip improves performance through the internal solidification fingerprint algorithm and accelerator scheme; however, this scheme is not universal and not suitable for other fingerprint algorithms, that is, it cannot meet the needs of many other fingerprint algorithm vendors, and the solidified fingerprint algorithm Unable to upgrade and optimize later, which hinders the optimization update of the fingerprint algorithm and hinders the path of performance improvement
[0008] It can be seen that the existing technology cannot guarantee the security of the fingerprint algorithm, the security of the user's fingerprint private data, and the security of the transmission link of the fingerprint authentication result, and at the same time, the performance of the chip needs to be improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint safety chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0025] An embodiment of the present invention provides a fingerprint security chip, including: a security module supporting the national secret algorithm, a fingerprint hardware operator accelerator, an instruction cache memory I-Cache, and a bus; wherein, the security module, the fingerprint hardware operator accelerator, and I-Cache is connected by bus.

[0026] Optionally, the fingerprint security chip also includes: encrypted flash memory (Flash), connected to I-Cache. Among them, the fingerprint algorithm and fingerprint data can be stored in encrypted Flash to ensure the security of the storage environment.

[0027] Optionally, the fingerprint security chip further in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fingerprint safety chip, which comprises a safety module, a fingerprint hardware operator accelerator, an instruction high-speed cache memory I-Cache and a busbar, wherein the safety module is used for supporting a GMB algorithm; the safety module, the fingerprint hardware operator accelerator and the instruction high-speed cache memory I-Cache are connected by the busbar. The fingerprint safety chip has the advantages that the safety of the data processing of the fingerprint identification is improved, and the chip property is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a fingerprint security chip. Background technique [0002] Fingerprint identification technology is currently the most mature and cheap biometric identification technology. Due to the lifelong invariance, uniqueness and convenience of fingerprints, fingerprint recognition is currently the most widely used and mature biometric authentication method. In recent years, with the advancement of science and technology, the application of fingerprint recognition has become more and more extensive, and it has been increasingly used in key identity authentication links in financial payment, electronic card and other fields. Subsequently, there are more and more attacks on fingerprint identification. Therefore, the security and reliability of the fingerprint identification link need to be improved urgently. [0003] The complete fingerprint identification process includes two processes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/32
CPCG06F21/32G06F21/78
Inventor 王勇范丽芳刘津王京阳
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products