Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A key generation component for use within a physical chip

A key generation and component technology, applied in key distribution, can solve the problem of private key without effective security measures, and achieve the effect of ensuring security and reliability, and ensuring security and reliability

Inactive Publication Date: 2019-06-04
ANTAIOS (BEIJING) INFORMATION TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, an object of the present invention is to propose a key generation component used in a physical chip to solve the problem that there are no effective security measures in the process of generating, storing, and using private keys in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key generation component for use within a physical chip
  • A key generation component for use within a physical chip
  • A key generation component for use within a physical chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. These embodiments of the present invention may be referred to herein, individually or collectively, by the term "invention", which is for convenience only and is not intended to automatically limit the application if in fact more than one invention is disclosed The scope is any individual invention or inventive concept.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key generation assembly used in a physical chip, and the key generation assembly comprises a random number generator which is used for responding to a first signal so as to generate an unpredictable coding value; a burning unit which is used for executing the operation of burning the coded value into the OTP storage unit; and an OTP storage unit is used for solidifying thecoded value to serve as a private key. According to the invention, the private key in the key generation assembly is generated by the unpredictable random number in the chip; According to the invention, the private key value does not have any relation and interaction with the outside of the chip after being burnt into the OTP module, the uniqueness and undetectability of the private key are ensured, and the private key cannot be known no matter whether the component is externally provided with a development designer or an attacker, so that the security and reliability of the private key are ensured.

Description

technical field [0001] The invention belongs to the technical field of data encryption / decryption, in particular to a key generation component used in a physical chip. Background technique [0002] Data has been proven to be one of the important assets of enterprises, and the rapid growth of data has made enterprises face unprecedented challenges. In view of the current data security requirements, the mainstream technology is encryption / decryption processing through cryptographic algorithms, and key management as the basis of encryption / decryption processing. [0003] The key refers to the paired public key and private key. The public key is the public part of the key pair. It is usually used to encrypt session keys, verify data signatures, or encrypt data streams that can be decrypted with the corresponding private key; The key is the non-public part of the key pair, which is usually used to decrypt the session key, perform data signature, decrypt the data stream encrypted...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 汪家祥陆铁军
Owner ANTAIOS (BEIJING) INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products