CN116707772A - Identity information management method of controller chip - Google Patents

Identity information management method of controller chip Download PDF

Info

Publication number
CN116707772A
CN116707772A CN202310976189.7A CN202310976189A CN116707772A CN 116707772 A CN116707772 A CN 116707772A CN 202310976189 A CN202310976189 A CN 202310976189A CN 116707772 A CN116707772 A CN 116707772A
Authority
CN
China
Prior art keywords
ciphertext data
chip
bit stream
data
uplink
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310976189.7A
Other languages
Chinese (zh)
Inventor
田胜利
张�成
苏立堂
顾炜炜
田家庚
王贵祥
韩欣
齐振鲁
藏凯
李兆才
赵美
吴琳琳
姚山旭
王栋
周恒�
米均益
孙建树
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Tianhe Science And Technology Co ltd
Original Assignee
Shandong Tianhe Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Tianhe Science And Technology Co ltd filed Critical Shandong Tianhe Science And Technology Co ltd
Priority to CN202310976189.7A priority Critical patent/CN116707772A/en
Publication of CN116707772A publication Critical patent/CN116707772A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an identity information management method of a controller chip, and belongs to the technical field of data identification. The invention uses clock source characteristics as an excitation source, and obtains an identity verification result by comparing the response value of the key generation circuit as a unique identity mark with preset standard data. In the data flow layer, adopting double chips to be respectively and independently associated with an upper computer and a key generation circuit, and exchanging information between the two chips by ciphertext data; the clock source characteristic forms downlink ciphertext data through bit stream coding and bit stream encryption, and the response value of the key generation circuit can adopt AES-CBC block encryption or AES-GCM stream encryption to form uplink ciphertext data; and for the received uplink ciphertext data, the received uplink ciphertext data is stored by a special RAM on the chip, and the storage position is selected from BBRAM or eFUSE, so that the safety of the data is ensured. The key generation circuit can generate a unique key according to the uniqueness of read-write operation, the random frequency characteristic of the ring oscillator circuit or the tiny difference of capacitance, and the accuracy and uniqueness of identity verification are ensured.

Description

Identity information management method of controller chip
Technical Field
The invention relates to the technical field of data identification, in particular to an identity information management method of a controller chip.
Background
The robot controller is one of the most central parts of the industrial robot, plays a decisive role in the performance of the robot and affects the development of the robot to a certain extent. The robot controller is a device for controlling the robot to complete certain actions or work tasks according to the instructions and the sensing information, and is a heart of the robot, so that the performance of the robot is determined. The chip is a component of the control robot system, and in the case of an industrial robot, it is necessary to mount a chip including FPGA, MCU, DSP, IGBT.
The FPGA chip has the advantages of high speed, parallelism, abundant operation and pin resources, flexible functions, direct realization of algorithm by hardware, simple and efficient operand access mechanism, direct detection of the bottom layer of hardware by developing and debugging means and the like when being applied to the field of robots. The application of the FPGA in the servo driver is a common practice in the industry, and the FPGA is stronger than a CPU in the aspect of executing an image processing algorithm, so that the FPGA is an optimal scheme; when executing the artificial intelligence algorithm, the FPGA is a mainstream scheme parallel to the GPU, and has certain advantages in terms of power consumption. In addition to shortening development and verification cycles, the use of FPGAs, as compared to ASIC development, also means that the logic can be changed quickly when a problem arises, or that functional requirements can be modified or enhanced if necessary.
Although the method has the advantages in the aspects of execution efficiency, power consumption, programmability and the like, the FPGA chip has the defects of high cost, complex design, poor safety and the like. Especially for wide-range applications as robot control chips, there may be a security risk, as the FPGA chip is programmable, for example unauthorized persons may insert malicious code into the FPGA chip. To adequately protect it from attacks, FPGA vendors have introduced bit stream encryption techniques to authenticate and keep secret. Various techniques have been proposed in the past for bit stream encryption such as bypass analysis and detection, however, new attack modes manipulate the encrypted bit stream during configuration, redirecting decrypted content to the WBSTAR configuration registers whose contents can be read out after reset, thereby implementing an attack bypassing the encryption hierarchy. In this case, improving the management level of the chip on the identity information is also one way to reduce the security risk.
Disclosure of Invention
The invention aims at solving the technical defects of the prior art, and provides an identity information management method of a controller chip, so as to solve the technical problem that the conventional management method is to be improved in safety.
In order to achieve the technical purpose, the invention adopts the following technical scheme:
an identity information management method of a controller chip, comprising: the primary chip responds to an upper computer instruction to read the clock source characteristic of the controller chip from the DB, encodes the clock source characteristic into a bit stream and encrypts the bit stream to form downlink ciphertext data, then transmits the downlink ciphertext data to the secondary chip, decodes the received downlink ciphertext data and loads the decoded downlink ciphertext data to the key generation circuit, the secondary chip encrypts a response value from the key generation circuit to form uplink ciphertext data, the uplink ciphertext data is returned to the primary chip, and the primary chip decodes the received uplink ciphertext data and compares the decoded uplink ciphertext data with preset standard data to obtain an identity verification result.
Preferably, the key generation circuit generates a plurality of different key data under the same circuit structure by utilizing the process parameter deviation in the integrated circuit manufacturing process, so as to realize the hardware function with the chip identity.
Preferably, the key generation circuit is selected from SRAM PUF circuits, ringOscillator PUF circuits, or PUF circuits based on interconnection capacitance.
Preferably, the SRAM PUF exploits the inherent randomness of the SRAM memory cells to generate a non-replicable key by read and write operations to the SRAM; ring Oscillator PUF utilizes the random frequency characteristics of the ring oscillator circuit to generate a non-replicable key by starting and stopping the ring oscillator; PUFs based on interconnection capacitance exploit small differences in capacitance to generate unique keys.
Preferably, the primary chip is provided with a bit stream encryption module and an on-chip bit stream decryption module, and the received uplink ciphertext data is stored by a special RAM on the chip, and the storage position is selected from BBRAM or eFUSE.
Preferably, the uplink ciphertext data is transmitted only through the JTAG port, and the on-chip bit stream decryption module adopts AES decryption logic and is not used for other purposes for decrypting the uplink ciphertext data.
Preferably, the encryption mode of the primary chip to the bit stream is selected from AES-CBC block encryption or AES-GCM stream encryption; wherein the AES-GCM stream encryption is provided with a GMAC information verification module.
Preferably, the primary chip executes the following steps while receiving the uplink ciphertext data: generating an unencrypted bit stream, an encrypted bit stream using an independent key, an encrypted bit stream using all 1's, an encrypted bit stream using all 0's, respectively, checking each generated bit stream to verify whether encryption has been performed
Preferably, the method further comprises: checking hardware, testing an FPGA decoder and testing the safety of uplink ciphertext data on an FPGA which is not programmed.
Preferably, the checking hardware includes: the device programmer is connected to the FPGA, unencrypted data is downloaded through JTAG, and whether the design operates according to expectations is verified; the test FPGA decoder includes: downloading a bit stream file encrypted by using an all-zero key, and loading the bit stream file to eFUSEs; the security testing of the uplink ciphertext data comprises the following steps: the bit stream file encrypted using the independent key is downloaded and compared to the expected configuration.
The invention discloses an identity information management method of a controller chip. According to the technical scheme, clock source characteristics are used as an excitation source, a response value of a key generation circuit is used as a unique identity mark, and the unique identity mark is compared with preset standard data, so that an identity verification result is obtained. In the data flow layer, the invention adopts double chips to be respectively and independently associated with an upper computer and a key generation circuit, and information is exchanged between the two chips by ciphertext data; the clock source characteristic forms downlink ciphertext data through bit stream coding and bit stream encryption, and the response value of the key generation circuit can adopt AES-CBC block encryption or AES-GCM stream encryption to form uplink ciphertext data; for the received uplink ciphertext data, the storage position is selected from BBRAM or eFUSE in the special RAM on the chip, so that the security of the data is ensured. The key generation circuit can generate a unique key according to the uniqueness of read-write operation, the random frequency characteristic of the ring oscillator circuit or the tiny difference of capacitance, and the accuracy and uniqueness of identity verification are ensured.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. In order to avoid unnecessary detail, well-known structures or functions will not be described in detail in the following embodiments. Approximating language, as used in the following examples, may be applied to create a quantitative representation that could permissibly vary without resulting in a change in the basic function. Unless defined otherwise, technical and scientific terms used in the following examples have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
Example 1
An identity information management method of a controller chip, comprising: the primary chip responds to an upper computer instruction to read the clock source characteristic of the controller chip from the DB, encodes the clock source characteristic into a bit stream and encrypts the bit stream to form downlink ciphertext data, then transmits the downlink ciphertext data to the secondary chip, decodes the received downlink ciphertext data and loads the decoded downlink ciphertext data to the key generation circuit, the secondary chip encrypts a response value from the key generation circuit to form uplink ciphertext data, the uplink ciphertext data is returned to the primary chip, and the primary chip decodes the received uplink ciphertext data and compares the decoded uplink ciphertext data with preset standard data to obtain an identity verification result. The key generation circuit is selected from an SRAM PUF circuit, a RingOscillator PUF circuit or an interconnection capacitance-based PUF circuit. The SRAM PUF generates a non-replicable key through read-write operation of the SRAM by utilizing the inherent randomness of the SRAM storage unit; ring Oscillator PUF utilizes the random frequency characteristics of the ring oscillator circuit to generate a non-replicable key by starting and stopping the ring oscillator; PUFs based on interconnection capacitance exploit small differences in capacitance to generate unique keys.
Example 2
An identity information management method of a controller chip, comprising: the primary chip responds to an upper computer instruction to read the clock source characteristic of the controller chip from the DB, encodes the clock source characteristic into a bit stream and encrypts the bit stream to form downlink ciphertext data, then transmits the downlink ciphertext data to the secondary chip, decodes the received downlink ciphertext data and loads the decoded downlink ciphertext data to the key generation circuit, the secondary chip encrypts a response value from the key generation circuit to form uplink ciphertext data, the uplink ciphertext data is returned to the primary chip, and the primary chip decodes the received uplink ciphertext data and compares the decoded uplink ciphertext data with preset standard data to obtain an identity verification result.
The key generation circuit generates a plurality of different key data under the same circuit structure by utilizing the technological parameter deviation in the integrated circuit manufacturing process, so as to realize the hardware function with the chip identity.
The key generation circuit is selected from an SRAM PUF circuit, a RingOscillator PUF circuit or an interconnection capacitance-based PUF circuit.
The SRAM PUF generates a non-replicable key through read-write operation of the SRAM by utilizing the inherent randomness of the SRAM storage unit; ring Oscillator PUF utilizes the random frequency characteristics of the ring oscillator circuit to generate a non-replicable key by starting and stopping the ring oscillator; PUFs based on interconnection capacitance exploit small differences in capacitance to generate unique keys.
The primary chip is provided with a bit stream encryption module and an on-chip bit stream decryption module, and the received uplink ciphertext data is stored by a special RAM on the chip, and the storage position is selected from BBRAM or eFUSE.
The uplink ciphertext data is transmitted only through the JTAG port, and the on-chip bit stream decryption module adopts AES decryption logic and is not used for other purposes for decrypting the uplink ciphertext data.
The encryption mode of the primary chip to the bit stream is selected from AES-CBC block encryption or AES-GCM stream encryption; wherein the AES-GCM stream encryption is provided with a GMAC information verification module.
The primary chip executes the following steps when receiving the uplink ciphertext data: generating an unencrypted bit stream, an encrypted bit stream using an independent key, an encrypted bit stream using all 1's, an encrypted bit stream using all 0's, respectively, checking each generated bit stream to verify whether encryption has been performed
Further comprises: checking hardware, testing an FPGA decoder and testing the safety of uplink ciphertext data on an FPGA which is not programmed.
The inspection hardware includes: the device programmer is connected to the FPGA, unencrypted data is downloaded through JTAG, and whether the design operates according to expectations is verified; the test FPGA decoder includes: downloading a bit stream file encrypted by using an all-zero key, and loading the bit stream file to eFUSEs; the security testing of the uplink ciphertext data comprises the following steps: the bit stream file encrypted using the independent key is downloaded and compared to the expected configuration.
The foregoing describes the embodiments of the present invention in detail, but the description is only a preferred embodiment of the present invention and is not intended to limit the present invention. Any modification, equivalent replacement, improvement, etc. made within the scope of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An identity information management method of a controller chip, comprising: the primary chip responds to an upper computer instruction to read the clock source characteristic of the controller chip from the DB, encodes the clock source characteristic into a bit stream and encrypts the bit stream to form downlink ciphertext data, then transmits the downlink ciphertext data to the secondary chip, decodes the received downlink ciphertext data and loads the decoded downlink ciphertext data to the key generation circuit, the secondary chip encrypts a response value from the key generation circuit to form uplink ciphertext data, the uplink ciphertext data is returned to the primary chip, and the primary chip decodes the received uplink ciphertext data and compares the decoded uplink ciphertext data with preset standard data to obtain an identity verification result.
2. The method for managing identity information of a controller chip according to claim 1, wherein the key generation circuit generates a plurality of different key data under the same circuit structure by using process parameter deviation in the integrated circuit manufacturing process, thereby realizing a hardware function with chip identity.
3. The method of claim 1, wherein the key generation circuit is selected from the group consisting of SRAM PUF circuits, ringOscillator PUF circuits, and PUF circuits based on interconnection capacitance.
4. A method of managing identity information of a controller chip according to claim 3, wherein the SRAM PUF uses the inherent randomness of the SRAM memory cells to generate a non-replicable key by read-write operations to the SRAM; ring Oscillator PUF utilizes the random frequency characteristics of the ring oscillator circuit to generate a non-replicable key by starting and stopping the ring oscillator; PUFs based on interconnection capacitance exploit small differences in capacitance to generate unique keys.
5. The method of claim 1, wherein the primary chip is provided with a bitstream encryption module and an on-chip bitstream decryption module, and the received uplink ciphertext data is stored in a dedicated RAM on-chip, and the storage location is selected from BBRAM or eFuse.
6. The method of claim 1, wherein the upstream ciphertext data is transmitted only through a JTAG port, and the on-chip bitstream decryption module uses AES decryption logic without other use for decrypting the upstream ciphertext data.
7. The method for managing identity information of a controller chip according to claim 1, wherein the encryption mode of the bit stream by the primary chip is selected from AES-CBC block encryption or AES-GCM stream encryption; wherein the AES-GCM stream encryption is provided with a GMAC information verification module.
8. The method for managing identity information of a controller chip according to claim 1, wherein the primary chip performs the following steps while receiving the uplink ciphertext data: generating an unencrypted bit stream, an encrypted bit stream using an independent key, an encrypted bit stream using all 1's, and an encrypted bit stream using all 0's, respectively, and checking each of the generated bit streams to verify whether encryption has been performed.
9. The method for managing identity information of a controller chip according to claim 1, further comprising: checking hardware, testing an FPGA decoder and testing the safety of uplink ciphertext data on an FPGA which is not programmed.
10. The method for managing identity information of a controller chip according to claim 9, wherein said checking hardware comprises: the device programmer is connected to the FPGA, unencrypted data is downloaded through JTAG, and whether the design operates according to expectations is verified; the test FPGA decoder includes: downloading a bit stream file encrypted by using an all-zero key, and loading the bit stream file to eFUSEs; the security testing of the uplink ciphertext data comprises the following steps: the bit stream file encrypted using the independent key is downloaded and compared to the expected configuration.
CN202310976189.7A 2023-08-04 2023-08-04 Identity information management method of controller chip Pending CN116707772A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310976189.7A CN116707772A (en) 2023-08-04 2023-08-04 Identity information management method of controller chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310976189.7A CN116707772A (en) 2023-08-04 2023-08-04 Identity information management method of controller chip

Publications (1)

Publication Number Publication Date
CN116707772A true CN116707772A (en) 2023-09-05

Family

ID=87826158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310976189.7A Pending CN116707772A (en) 2023-08-04 2023-08-04 Identity information management method of controller chip

Country Status (1)

Country Link
CN (1) CN116707772A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204743A1 (en) * 2002-04-16 2003-10-30 Srinivas Devadas Authentication of integrated circuits
KR20100067584A (en) * 2008-12-11 2010-06-21 한국전자통신연구원 Device and method for offering integrated security
CN104090790A (en) * 2014-06-30 2014-10-08 飞天诚信科技股份有限公司 Two-chip scheme firmware updating method for safety terminal
CN108234132A (en) * 2017-12-07 2018-06-29 深圳市中易通安全芯科技有限公司 The safe communication system and method for a kind of main control chip and encryption chip
CN110889123A (en) * 2019-11-01 2020-03-17 浙江地芯引力科技有限公司 Authentication method, key pair processing method, device and readable storage medium
CN110909338A (en) * 2019-11-01 2020-03-24 浙江地芯引力科技有限公司 Security authentication method and system based on security chip and security chip
CN111082925A (en) * 2019-10-23 2020-04-28 中山大学 Embedded system encryption protection device and method based on AES algorithm and PUF technology
CN210515295U (en) * 2019-11-01 2020-05-12 浙江地芯引力科技有限公司 Security authentication system and information processing device based on security chip
WO2021083349A1 (en) * 2019-11-01 2021-05-06 浙江地芯引力科技有限公司 Security chip-based security authentication method and system, security chip, and readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204743A1 (en) * 2002-04-16 2003-10-30 Srinivas Devadas Authentication of integrated circuits
KR20100067584A (en) * 2008-12-11 2010-06-21 한국전자통신연구원 Device and method for offering integrated security
CN104090790A (en) * 2014-06-30 2014-10-08 飞天诚信科技股份有限公司 Two-chip scheme firmware updating method for safety terminal
CN108234132A (en) * 2017-12-07 2018-06-29 深圳市中易通安全芯科技有限公司 The safe communication system and method for a kind of main control chip and encryption chip
CN111082925A (en) * 2019-10-23 2020-04-28 中山大学 Embedded system encryption protection device and method based on AES algorithm and PUF technology
CN110889123A (en) * 2019-11-01 2020-03-17 浙江地芯引力科技有限公司 Authentication method, key pair processing method, device and readable storage medium
CN110909338A (en) * 2019-11-01 2020-03-24 浙江地芯引力科技有限公司 Security authentication method and system based on security chip and security chip
CN210515295U (en) * 2019-11-01 2020-05-12 浙江地芯引力科技有限公司 Security authentication system and information processing device based on security chip
WO2021083349A1 (en) * 2019-11-01 2021-05-06 浙江地芯引力科技有限公司 Security chip-based security authentication method and system, security chip, and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘丹等: "《一种基于SRAM PUF的安全双向认证协议》", 《密码学报》 *
张亮: "《一种安全身份认证芯片研究与实现》", 《CNKI优秀硕士学位论文全文库》 *

Similar Documents

Publication Publication Date Title
CN108269605B (en) Security device state apparatus and method
US20240031158A1 (en) Secure unlock systems for locked devices
US20200302090A1 (en) Selectively Disabling Configurable Communication Paths of a Multiprocessor Fabric
US9165143B1 (en) Image file generation and loading
US9230112B1 (en) Secured booting of a field programmable system-on-chip including authentication of a first stage boot loader to mitigate against differential power analysis
JP5607546B2 (en) Method and apparatus for controlling system access during a protected mode of operation
US8423788B2 (en) Secure memory card with life cycle phases
KR101726108B1 (en) Secure key derivation and cryptography logic for integrated circuits
US8572410B1 (en) Virtualized protected storage
TWI460604B (en) Secure microcontroller,hardware cipher,and method for securing content within a microcontroller
CN100386707C (en) Generating key hierarchy for use in isolated execution environment
US8321686B2 (en) Secure memory card with life cycle phases
KR20170095161A (en) Secure system on chip
US20060176068A1 (en) Methods used in a secure memory card with life cycle phases
US11354417B2 (en) Enhanced secure boot
CN107729758A (en) Secure processor for multi-tenant cloud workloads
KR100972540B1 (en) Secure memory card with life cycle phases
CN107111728A (en) Safe key export function
Kumar et al. Itus: A secure risc-v system-on-chip
CN108920984A (en) The anti-clone of one kind distorts safe SSD main control chip framework
Jiang et al. Implementing a arm-based secure boot scheme for the isolated execution environment
CN116707772A (en) Identity information management method of controller chip
CN111095213B (en) Secure boot method, device, equipment and storage medium for embedded program
Chaves et al. Reconfigurable cryptographic processor
Niu et al. Security Mechanism Design on the Embedded Computer System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination