Method and device for reconstructing hardware secret key of memory
A memory and secret key technology, applied in the field of data security, can solve problems such as changes in the bias of storage units, and achieve the effect of improving the success rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.
[0068] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. The IoT device includes a CPU and a memory, and the CPU can obtain the hardware key of the memory as the key of the IoT device. The IoT device can use the hardware key to perform operations such as data encryption or device authentication during communication with the server. When the CPU acquires the hardware key, it can determine it by using the recorded location information and rollover probability of the storage unit in the memory. In the embodiment of this specification, the aforementioned Internet of Things device is only a specific device implementation, and in practical applications, any other device including a CPU and a memory may be used instead.
[0069] For physical entities such as Internet of Things devices, smart cards
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap