General purpose computation, trusted computation and cryptographic computation integrated safety processor

A security processor, trusted computing technology, applied in computer security devices, computing, electrical digital data processing and other directions, can solve the problems of low reliability, reverse engineering attacks, weak security, etc., to achieve efficient transmission, defense against physical attacks , the effect of improving safety

Active Publication Date: 2018-09-04
成都三零嘉微电子有限公司
View PDF11 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Weak security
[0005] In the traditional safe and trusted design scheme, the security of the system is mainly realized through separate boards. Many key parameters and key security processing and calculation processes are directly exposed on the separate boards, which are particularly vulnerable to physical attacks. Reverse engineering attacks, cloning attacks, etc.
[0006] (2) Low reliability
Especially in the field of special applications, the environmental adaptability and reliability requirements for temperature, humidity, vibration, etc. are very high, and the traditional design scheme cannot fundamentally guarantee the reliability of the design
[0008] (3) Higher cost
[0009] In the traditional safe and trusted design scheme, its hardware design cost, development cost, hardware debugging cost, hardware maintenance cost, etc. are all very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General purpose computation, trusted computation and cryptographic computation integrated safety processor
  • General purpose computation, trusted computation and cryptographic computation integrated safety processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] A security processor that integrates general computing, trusted computing, and cryptographic computing. The overall architecture is as follows: figure 1 Shown:

[0021] (1) Overall structure

[0022] The overall architecture of the integrated security processor is divided into two domains, the general processing domain and the secure and trusted processing domain, which are divided into three layers from top to bottom, namely the hardware layer, OS layer, and application layer, such as figure 1 shown.

[0023] (a) Hardware layer

[0024] The hardware layer mainly includes a general-purpose processing unit and a security and trustworthy unit, which realize data interaction through data channels, management channels, and trusted security control channels.

[0025] A data channel, which is a dedicated channel for the safe and trusted unit to process high-speed data. The input and output data of the secure and trusted unit in the process of trusted computing and cryptog...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a general purpose computation, trusted computation and cryptographic computation integrated safety processor, which comprises a general processing unit and a safety trusted processing unit. The general processing unit and a safety trusted processing unit realize data interaction through a data channel, a management channel and a trusted safety control channel. Compared withthe prior art, the safety processor has advantages that by chip level deep fusion of the general processing unit and the safety trusted processing unit, on-chip efficient transmission of data betweenthe general processing unit and the safety trusted processing unit is realized, chip level cryptographic services are provided, chip level trusted services according with trusted computation relatedstandards are provided, safety is effectively improved, and the safety processor is capable of withstanding physical attacks, reverse engineering attacks and cloning attacks.

Description

technical field [0001] The present invention relates to the field of integrated circuit design, and integrates general computing, trusted computing, and cryptographic computing into a chip-level integrated fusion architecture design. In this design, the general processing unit provides general computing services, and the safe and trusted computing unit provides trusted computing, Cryptographic Computing Services. The security processor designed based on this architecture can guarantee to provide users with high-performance general-purpose computing services and cryptographic services in a safe and trusted environment, aiming to solve the shortcomings of the traditional multi-chip card separation design, and to provide security and reliability It provides a new chip-level solution for letter applications. Background technique [0002] With the rapid development of Internet information technology, people have higher and higher requirements for information security processing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F21/606
Inventor 何卫国李军李雨励饶金涛詹璨铭
Owner 成都三零嘉微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products