CN116028992B - SoC chip and method for realizing data security detection thereof - Google Patents
SoC chip and method for realizing data security detection thereof Download PDFInfo
- Publication number
- CN116028992B CN116028992B CN202310159387.4A CN202310159387A CN116028992B CN 116028992 B CN116028992 B CN 116028992B CN 202310159387 A CN202310159387 A CN 202310159387A CN 116028992 B CN116028992 B CN 116028992B
- Authority
- CN
- China
- Prior art keywords
- value
- soc chip
- soc
- unit
- initial value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000001514 detection method Methods 0.000 title claims abstract description 21
- 238000012545 processing Methods 0.000 claims description 45
- 238000012795 verification Methods 0.000 claims description 27
- 238000004364 calculation method Methods 0.000 claims description 13
- 230000006870 function Effects 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The application discloses a SoC chip and a method for realizing data security detection, wherein the hardware initial value generated by the SoC chip is random and indefinite when the SoC chip is electrified and initialized each time, that is, the SoC chip provided by the embodiment of the application generates a specific security identifier by utilizing the hardware characteristic, and the hardware characteristic is a hardware basis for realizing a PUF, so that the SoC chip provided by the embodiment of the application becomes a security chip with the PUF, and the security of the SoC chip is ensured by checking the hardware initial value and the stored security identifier generated when the SoC chip is electrified and initialized each time after the SoC chip is electrified and initialized, and the security of the SoC chip is ensured safely, stably and reliably.
Description
Technical Field
The present application relates to, but not limited to, hardware security technologies, and in particular, to a SoC chip and a method for implementing data security detection.
Background
With the rapid development of integrated circuit technology, the functions of circuits in a chip are more and more complex, and the functions integrated in a single chip are more and more, so as to adapt to the requirements of the complexity of a chip system, the chip design has been developed from a single large-scale integrated circuit to the systemization of multifunctional IP integration. Among them, a System on Chip (SoC) is a major solution to replace a conventional integrated circuit, and has become a necessary trend in the current microelectronic Chip technology development.
The SoC chip contains the complete system and has the entire contents of the embedded software. In the working process of the SoC chip, starting safety is the guarantee of all subsequent safety mechanisms, and if the safety of the SoC chip has loopholes, serious safety problems can be generated. In the related art, the security of SoC chips is based on a cryptographic algorithm to perform data security detection, including a symmetric algorithm, a hash algorithm, a public key algorithm, and the like. However, these algorithms have a common problem that they cannot cope with the risk of leakage of the corresponding key.
Therefore, a more secure, stable and reliable data security detection method is needed to ensure the security of the SoC chip.
Disclosure of Invention
The application provides an SoC chip and a method for realizing data security detection thereof, which can safely, stably and reliably ensure the security of the SoC chip.
The embodiment of the invention provides an SoC chip, which comprises: the control unit is embedded with a logic processing unit of the RAM unit and the Flash unit; wherein,
The logic processing unit is used for generating a second hardware initial value by the RAM unit when the RAM unit is powered on for initialization; the Flash unit stores a first numerical value serving as a security identifier of a system-on-chip (SoC) system so that the SoC chip becomes a security chip with a Physical Unclonable Function (PUF);
The control unit is used for reading the first numerical value from the Flash unit and reading the second hardware initial value from the RAM unit every time the SoC system is started; and carrying out security verification according to the read first numerical value and the second hardware initial value, if the verification is passed, the SoC chip is safe and usable, and if the verification is not passed, the SoC chip is unsafe.
In an exemplary example, the logic processing unit is further to:
At power-on initialization, the RAM unit generates a first hardware initial value; storing the first numerical value from the control unit in the Flash unit; in response to this, the control unit,
The control unit is further configured to:
And reading a first hardware initial value from the RAM unit, converting the read first hardware initial value into the first numerical value, and writing the first numerical value into the Flash unit as a security identifier of the SoC system.
In an exemplary embodiment, converting the read first hardware initial value into the first numerical value in the control unit includes:
and converting the first hardware initial value into the first numerical value of 1KB through a preset calculation mode.
In an exemplary embodiment, the security verification in the control unit according to the read first value and the second hardware initial value includes:
converting the second hardware initial value into a second numerical value according to a preset calculation mode;
Comparing the first value with the second value, and if the first value and the second value are consistent, indicating that the verification is passed, enabling the SoC chip to be safe and usable; if the two are inconsistent, the verification is not passed, and the SoC chip is not safe.
In one illustrative example, the control unit includes a micro control unit MCU.
In one illustrative example, the logic processing unit includes a field programmable gate array FPGA unit.
The embodiment of the application also provides a method for realizing data security detection, which comprises the following steps:
in the starting of the SoC system, the SoC chip reads a first numerical value serving as a security identifier of the SoC system from a Flash unit embedded in a logic processing unit of the SoC chip, and reads a second hardware initial value from a RAM unit embedded in the logic processing unit of the SoC chip; when the second hardware initial value is generated by a RAM unit embedded in the logic processing unit during power-on initialization;
and the SoC chip performs security verification according to the read first numerical value and the second hardware initial value, if the verification is passed, the SoC chip is safe and usable, and if the verification is not passed, the SoC chip is unsafe.
In an exemplary embodiment, the method further comprises:
The RAM unit generates a first hardware initial value when the SoC chip is powered on and initialized; the SoC chip reads a first hardware initial value from the RAM unit and converts the read first hardware initial value into the first numerical value;
And taking the first numerical value as a security identifier of the SoC system and writing the first numerical value into the Flash unit so that the SoC chip becomes a security chip with a PUF.
In one illustrative example, the converting the read first hardware initial value to a first numerical value includes:
and converting the first hardware initial value into the first numerical value of 1KB through a preset calculation mode.
In an exemplary embodiment, the security verification according to the read first value and the second hardware initial value includes:
converting the second hardware initial value into a second numerical value according to a preset calculation mode;
Comparing the first value with the second value, and if the first value and the second value are consistent, indicating that the verification is passed, enabling the SoC chip to be safe and usable; if the two are inconsistent, the verification is not passed, and the SoC chip is not safe.
Embodiments of the present application further provide a computer-readable storage medium storing computer-executable instructions for performing the method for implementing data security detection described in any one of the above.
The embodiment of the application further provides a device for realizing data security detection, which comprises a memory and a processor, wherein the memory stores the following instructions executable by the processor: a step for performing the method of implementing data security detection of any of the above.
The SoC chip provided by the embodiment of the application comprises the control unit, and the logic processing unit embedded with the RAM unit and the Flash unit, wherein the hardware initial value generated by the RAM unit embedded with the logic processing unit is random and indefinite when the SoC chip is initialized during power-on every time, that is, the SoC chip provided by the embodiment of the application utilizes the hardware characteristics of the control unit and the logic processing unit to generate a specific security identifier, the security identifier is placed in the Flash unit embedded with the logic processing unit, the hardware characteristic of the hardware initial value in the embodiment of the application is a hardware basis for realizing PUF, so that the SoC chip provided by the embodiment of the application becomes a security chip with PUF, and the security of the SoC chip is ensured by checking the hardware initial value generated during power-on initialization of the SoC and the security identifier stored in the Flash unit after each power-on initialization of the SoC chip.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate and do not limit the application.
Fig. 1 is a schematic diagram of a composition structure of an SoC chip in an embodiment of the present application;
fig. 2 is a flow chart of a method for implementing data security detection in an embodiment of the application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, embodiments of the present application will be described in detail hereinafter with reference to the accompanying drawings. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be arbitrarily combined with each other.
In one typical configuration of the application, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer readable media, as defined herein, does not include non-transitory computer readable media (transmission media), such as modulated data signals and carrier waves.
The steps illustrated in the flowchart of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, while a logical order is depicted in the flowchart, in some cases, the steps depicted or described may be performed in a different order than presented herein.
The physical unclonable function (PUF, PHYSICALLY UNCLONABLE FUNCTIONS) is a hardware security technology that can provide all functions from improved cryptography to IC counterfeiting. PUFs use inherent device variations to produce unclonable unique device responses for a given input. Based on the PUF, the inventor provides an SoC chip with the PUF, which can safely, stably and reliably guarantee the safety of the SoC chip.
Fig. 1 is a schematic diagram of a composition structure of an SoC chip in an embodiment of the present application, where, as shown in fig. 1, the SoC chip at least includes: a control unit, a logic processing unit embedded with a Random Access Memory (RAM) unit and a Flash memory (Flash) unit; wherein,
The logic processing unit is used for generating a second hardware initial value by the RAM unit embedded in the logic processing unit when the power-on initialization is performed; the Flash unit embedded in the logic processing unit stores a first numerical value serving as a security identifier of the SoC system, so that the SoC chip to which the logic processing belongs becomes a security chip with a PUF.
The control unit is used for reading a first numerical value serving as a security identifier of the SoC system from a Flash unit embedded in the logic processing unit every time the SoC system is started, reading a second hardware initial value from a RAM unit embedded in the logic processing unit, performing security verification according to the read first numerical value serving as the security identifier of the SoC system and the second hardware initial value, if the verification is passed, the SoC chip which the control unit belongs to is safe and available, and if the verification is not passed, the SoC chip which the control unit belongs to is unsafe.
In one illustrative example, the logic processing unit is further to:
When power-on initialization is performed, a RAM unit embedded in a logic processing unit generates a first hardware initial value; storing a first value which is taken as a security identifier of the SoC system from the control unit into an embedded Flash unit so that the SoC chip to which the logic processing belongs becomes a security chip with a PUF;
Correspondingly, the control unit is further configured to:
and reading the first hardware initial value from the RAM unit embedded in the logic processing unit, converting the read first hardware initial value into a first numerical value, taking the first numerical value as a security identifier of the SoC system, and writing the first numerical value into the Flash unit embedded in the logic processing unit.
In one illustrative example, the control unit may include, but is not limited to, a micro control unit (MCU, microcontroller Unit), for example. The MCU is essentially a single chip microcomputer, which means a chip-level computer formed by integrating CPU, RAM, ROM, a timing counter and various I/O interfaces of the computer on a chip.
In one illustrative example, the logic processing unit may include, but is not limited to, a Field-Programmable gate array (FPGA) unit. FPGAs are a further development product based on PAL, GAL, CPLD and other programmable devices. FPGA is a semi-custom circuit in the field of Application Specific Integrated Circuits (ASIC), which not only solves the defect of custom circuits, but also overcomes the defect of limited gate circuit number of the original programmable device.
In one illustrative example, a first value that is a security identification of the SoC system may be stored at a preset address location in a Flash unit embedded in the FPGA unit.
In an exemplary embodiment, the control unit may read the hardware initial value from a preset address in a RAM unit embedded in the logic processing unit.
In an exemplary embodiment, converting the read first hardware initial value into the first numerical value in the control unit may include: and converting the read first hardware initial value into a first value of 1KB by a preset calculation mode, wherein the first value is used as a security identifier of the SoC system.
In an exemplary embodiment, the security verification performed by the control unit according to the read first value and the second hardware initial value as the security identifier of the SoC system may include:
According to a preset calculation mode, the read second hardware initial value is converted into a second numerical value, for example: converting the second hardware initial value into a second numerical value of 1KB according to a calculation mode in the power-on initialization;
comparing the first value and the second value which are used as the security identification of the SoC system, and if the first value and the second value are consistent, indicating that the verification is passed, then the control unit belongs to the SoC chip and is safe and available; if the two are inconsistent, the verification is not passed, the SoC chip to which the control unit belongs is not safe, for example, the SoC chip to which the control unit belongs may be modified or destroyed.
In one embodiment, comparing the first value and the second value as the security identification of the SoC system may include: and performing exclusive OR operation on each bit of the first value and the second value, and then performing OR operation sequentially, wherein if the operation result is 0, the first value and the second value which are used as the safety identification of the SoC system are consistent, and if the operation result is 1, the first value and the second value which are used as the safety identification of the SoC system are inconsistent. Such as: the first value is: 111000, the second value is: 111000, then, the following operation (1^1) | (1^1) | (1^1) | (0^0) | (0^0) | (0^0) =0, and the result is 0, which indicates that the first value and the second value are consistent, and the SoC chip is safe.
For example, when the SoC chip is powered up initially, the RAM unit will generate an initial value randomly, and special attention should be paid here to the fact that if the RAM unit is the same RAM unit, the initial value is constant every time the RAM unit is powered up, but the initial value is random for different RAM units after the RAM unit is powered up, for example: the initial value of the RAM of the chip 1 is 011100000111100, and the value is obtained after each power-on; the initial value of the RAM of chip 2 is 111100000111100, which is also this value each time after power-up. The randomness of the RAM initial values means that the RAM of the chip 1 and the RAM of the chip 2 are different, and the different RAM initial values are random, so that the chip 1 and the chip 2 are random and different. That is, for the same SoC chip, the value written into the Flash unit is compared with the initial value of the RAM after each power-up, and if the values are consistent, it is indicated that the PUF value in the Flash unit is of the SoC chip, the SoC chip is safely usable, and the PUF value is also safely usable.
The hardware initial value generated by the RAM unit embedded in the logic processing unit is random when the SoC chip is initialized during power-on every time, that is, the SoC chip provided by the embodiment of the application generates a specific safety mark by utilizing the hardware characteristics of the control unit and the logic processing unit, the safety mark is placed in the Flash unit embedded in the logic processing unit, the hardware characteristic reflected by the hardware initial value in the embodiment of the application is a hardware basis for realizing the PUF, so that the SoC chip provided by the embodiment of the application becomes a safety chip with the PUF, and the safety of the SoC chip is ensured by checking the hardware initial value generated during the power-on initialization of the SoC chip and the safety mark stored in the Flash unit after the power-on every time.
Fig. 2 is a flow chart of a method for implementing data security detection in an embodiment of the present application, including:
Step 200: in the starting of the SoC system, the SoC chip reads a first numerical value serving as a security identifier of the SoC system from a Flash unit embedded in a logic processing unit of the SoC chip, and reads a second hardware initial value from a RAM unit embedded in the logic processing unit of the SoC chip. Wherein, when the second hardware initial value is power-on initialization, the RAM unit embedded in the logic processing unit generates.
In an illustrative example, this step may further include:
When the SoC chip is electrified and initialized, a RAM unit embedded in a logic processing unit of the SoC chip generates a first hardware initial value; and reading a first hardware initial value from the RAM unit embedded in the logic processing unit, converting the read hardware initial value into a first numerical value, and writing the first numerical value serving as a security identifier of the SoC system into the Flash unit embedded in the logic processing unit so as to enable the SoC chip to which the logic processing belongs to become a security chip with a PUF.
In one illustrative example, a first value that is a security identification of the SoC system may be stored at a preset address location in a Flash unit embedded in the FPGA unit.
In an exemplary embodiment, the SoC chip may read the hardware initial value from a preset address in a RAM unit embedded in the logic processing unit.
In one embodiment, converting the read first hardware initial value to a first numerical value may include, for example: and converting the read first hardware initial value into a first value of 1KB by a preset calculation mode, wherein the first value is used as a security identifier of the SoC system.
Step 201: and the SoC chip performs security verification according to the read first numerical value and the second hardware initial value, if the verification is passed, the SoC chip is safe and usable, and if the verification is not passed, the SoC chip is unsafe.
In one illustrative example, step 201 may include:
According to a preset calculation mode, converting the read second hardware initial value into a second numerical value, and in one embodiment, for example, converting the second hardware initial value into a second numerical value of 1 KB;
Comparing the first value and the second value which are used as the security identification of the SoC system, and if the first value and the second value are consistent, indicating that the verification is passed, the SoC chip is safe and usable; if the two are inconsistent, the verification is not passed, the SoC chip is not safe, for example, the SoC chip to which the control unit belongs may be modified or destroyed.
According to the method for realizing data security detection, the hardware initial value generated by the RAM unit embedded in the logic processing unit is random and indefinite when the SoC chip is initialized during power-on every time, namely, the SoC chip provided by the embodiment of the application utilizes the hardware characteristics of the control unit and the logic processing unit to generate a specific security identifier, the security identifier is placed in the Flash unit embedded in the logic processing unit, the hardware characteristic reflected by the hardware initial value in the embodiment of the application is a hardware basis for realizing PUF, so that the SoC chip provided by the embodiment of the application becomes a security chip with a PUF, and therefore, the security of the SoC chip is ensured by checking the hardware initial value generated during power-on initialization of the SoC chip and the security identifier stored in the Flash unit after each power-on initialization of the SoC chip.
The present application also provides a computer readable storage medium storing computer executable instructions for performing the method of implementing data security detection as described in any one of fig. 2.
The application further provides a device for realizing data security detection, which comprises a memory and a processor, wherein the memory stores the following instructions executable by the processor: for performing the steps of the method of implementing data security detection described in any of fig. 2.
Although the embodiments of the present application are described above, the embodiments are only used for facilitating understanding of the present application, and are not intended to limit the present application. Any person skilled in the art can make any modification and variation in form and detail without departing from the spirit and scope of the present disclosure, but the scope of the present disclosure is to be determined by the appended claims.
Claims (8)
1. A SoC chip, comprising: the control unit is embedded with a logic processing unit of the RAM unit and the Flash unit; wherein,
The logic processing unit is used for: at power-on initialization, the RAM unit generates a first hardware initial value; storing a first numerical value from the control unit in the Flash unit; accordingly, the control unit is configured to: reading a first hardware initial value from the RAM unit, converting the read first hardware initial value into the first numerical value, and writing the first numerical value into the Flash unit as a security identifier of the SoC system;
The logic processing unit is further configured to generate a second hardware initial value by the RAM unit when the SOC system is started and initialized every time; the Flash unit stores a first numerical value serving as a security identifier of a system-on-chip (SoC) system so that the SoC chip becomes a security chip with a Physical Unclonable Function (PUF);
The control unit is further configured to read the first value from the Flash unit and read the second hardware initial value from the RAM unit every time the SoC system is started; converting the second hardware initial value into a second numerical value according to a preset calculation mode; comparing the first value with the second value, and if the first value and the second value are consistent, indicating that the verification is passed, enabling the SoC chip to be safe and usable; if the two are inconsistent, indicating that the verification is not passed, the SoC chip is unsafe;
the initial values of the same RAM unit after power-on are fixed, and the initial values of the different RAM units after power-on are random.
2. The SoC chip of claim 1, wherein converting the read first hardware initial value to the first value in the control unit comprises:
and converting the first hardware initial value into the first numerical value of 1KB through a preset calculation mode.
3. The SoC chip of claim 1, wherein the control unit comprises a micro control unit MCU.
4. The SoC chip of claim 1, wherein the logic processing unit comprises a field programmable gate array FPGA unit.
5. A method of implementing data security detection, comprising:
When the SoC chip is powered on and initialized, a first hardware initial value is generated from a RAM unit embedded in a logic processing unit of the SoC chip; the SoC chip reads a first hardware initial value from the RAM unit and converts the read first hardware initial value into a first numerical value; the first numerical value is used as a security identifier of the SoC system and is written into a Flash unit embedded in a logic processing unit of the SoC chip, so that the SoC chip becomes a security chip with a PUF;
The SoC chip reads the first numerical value serving as a security identifier of the SoC system from the Flash unit and reads a second hardware initial value from the RAM unit in the starting process of the SoC system; wherein, when the second hardware initial value is initialized when the SOC system is started and electrified, the RAM unit generates the second hardware initial value;
The SoC chip converts the second hardware initial value into a second numerical value according to a preset calculation mode; comparing the first value with the second value, and if the first value and the second value are consistent, indicating that the verification is passed, enabling the SoC chip to be safe and usable; if the two are inconsistent, indicating that the verification is not passed, the SoC chip is unsafe;
the initial values of the same RAM unit after power-on are fixed, and the initial values of the different RAM units after power-on are random.
6. The method of claim 5, wherein the converting the read first hardware initial value to a first numerical value comprises:
and converting the first hardware initial value into the first numerical value of 1KB through a preset calculation mode.
7. A computer-readable storage medium storing computer-executable instructions for performing the method of implementing data security detection of any one of claims 5-6.
8. An apparatus for implementing data security detection, comprising a memory and a processor, wherein the memory has stored therein instructions executable by the processor to: a method for performing the method for implementing data security detection of any one of claims 5 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310159387.4A CN116028992B (en) | 2023-02-23 | 2023-02-23 | SoC chip and method for realizing data security detection thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310159387.4A CN116028992B (en) | 2023-02-23 | 2023-02-23 | SoC chip and method for realizing data security detection thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116028992A CN116028992A (en) | 2023-04-28 |
CN116028992B true CN116028992B (en) | 2024-06-07 |
Family
ID=86072448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310159387.4A Active CN116028992B (en) | 2023-02-23 | 2023-02-23 | SoC chip and method for realizing data security detection thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116028992B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104836669A (en) * | 2015-05-08 | 2015-08-12 | 东南大学 | Security authentication method based on SRAM PUF (Static Random Access Memory Physical Uncloable Function), terminal and authentication system |
CN105007285A (en) * | 2015-08-19 | 2015-10-28 | 南京万道电子技术有限公司 | Key protection method and safety chip based on physical no-cloning function |
CN106941400A (en) * | 2017-03-06 | 2017-07-11 | 东南大学 | A kind of fuzzy safety box authentication method based on SRAM PUF |
CN109995507A (en) * | 2019-04-19 | 2019-07-09 | 武汉大学 | A kind of key generation method and device based on PUF, private key storage method |
CN113343245A (en) * | 2021-05-27 | 2021-09-03 | 长沙海格北斗信息技术有限公司 | Chip secure starting method, secure chip and receiver thereof |
CN115017517A (en) * | 2022-06-07 | 2022-09-06 | Oppo广东移动通信有限公司 | Chip and checking method |
CN115292084A (en) * | 2022-08-18 | 2022-11-04 | 泰凌微电子(上海)股份有限公司 | Data generation method and device, electronic equipment and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070101156A1 (en) * | 2005-10-31 | 2007-05-03 | Manuel Novoa | Methods and systems for associating an embedded security chip with a computer |
US20170288885A1 (en) * | 2016-03-31 | 2017-10-05 | Intel Corporation | System, Apparatus And Method For Providing A Physically Unclonable Function (PUF) Based On A Memory Technology |
US11329834B2 (en) * | 2020-02-11 | 2022-05-10 | Nxp B.V. | System and method for generating and authenticating a physically unclonable function |
-
2023
- 2023-02-23 CN CN202310159387.4A patent/CN116028992B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104836669A (en) * | 2015-05-08 | 2015-08-12 | 东南大学 | Security authentication method based on SRAM PUF (Static Random Access Memory Physical Uncloable Function), terminal and authentication system |
CN105007285A (en) * | 2015-08-19 | 2015-10-28 | 南京万道电子技术有限公司 | Key protection method and safety chip based on physical no-cloning function |
CN106941400A (en) * | 2017-03-06 | 2017-07-11 | 东南大学 | A kind of fuzzy safety box authentication method based on SRAM PUF |
CN109995507A (en) * | 2019-04-19 | 2019-07-09 | 武汉大学 | A kind of key generation method and device based on PUF, private key storage method |
CN113343245A (en) * | 2021-05-27 | 2021-09-03 | 长沙海格北斗信息技术有限公司 | Chip secure starting method, secure chip and receiver thereof |
CN115017517A (en) * | 2022-06-07 | 2022-09-06 | Oppo广东移动通信有限公司 | Chip and checking method |
CN115292084A (en) * | 2022-08-18 | 2022-11-04 | 泰凌微电子(上海)股份有限公司 | Data generation method and device, electronic equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
一种基于SRAM PUF的安全双向认证协议;刘丹等;密码学报;20170430;360-371 * |
Also Published As
Publication number | Publication date |
---|---|
CN116028992A (en) | 2023-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sutar et al. | D-PUF: An intrinsically reconfigurable DRAM PUF for device authentication in embedded systems | |
EP2191410B1 (en) | Identification of devices using physically unclonable functions | |
JP2020512779A (en) | Method and apparatus for processing transaction requests | |
US20170046281A1 (en) | Address dependent data encryption | |
Rosenblatt et al. | A self-authenticating chip architecture using an intrinsic fingerprint of embedded DRAM | |
US20190384938A1 (en) | Storage apparatus and method for address scrambling | |
CN108345806A (en) | A kind of hardware encryption card and encryption method | |
CN111342963A (en) | Data uplink method, data storage method and device | |
CN108256354B (en) | Test data-based storage method and storage medium | |
US11663145B2 (en) | Off-chip memory address scrambling apparatus and method for system on chip | |
US11533172B2 (en) | Apparatus and method for securely managing keys | |
CN112131595B (en) | Safe access method and device for SQLite database file | |
CN112887077B (en) | SSD main control chip random cache confidentiality method and circuit | |
US11106829B2 (en) | Chip fingerprint management based upon one-time programmable memory | |
US11934539B2 (en) | Method and apparatus for storing and processing application program information | |
CN111967065A (en) | Data protection method, processor and electronic equipment | |
CN109934584B (en) | Block chain account transaction method and equipment | |
Millwood et al. | Puf-phenotype: A robust and noise-resilient approach to aid group-based authentication with dram-pufs using machine learning | |
CN213876729U (en) | Random cache secret circuit of SSD main control chip | |
CN116028992B (en) | SoC chip and method for realizing data security detection thereof | |
CN115062330B (en) | TPM-based intelligent password key password application interface implementation method | |
TW201918925A (en) | Data accessing device and method | |
CN108228525B (en) | Device and method for safely realizing SOC (system on chip) of multi-core 8051 processor | |
US20240004803A1 (en) | Secure element and electronic device including the same | |
CN109901880B (en) | Spinlock hardware circuit and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |