Microprocessor with single pin for memory wipe
First Claim
Patent Images
1. A nonvolatile microprocessor-controlled module, comprising:
- encryption circuitry, said encryption circuitry including encryption registers;
power management circuitry having power input nodes;
a battery, said power input nodes coupled to said battery and to an external power supply terminal;
a volatile memory;
security violation detectors to detect a security violation;
a microcontroller coupled to supply power via said power management circuitry to said volatile memory and to control said encryption registers, said security violation detectors coupled to said microcontroller;
and wherein when a security violation is detected by said security violation detectors, said security violation detectors rewrite said encryption registers to a known value.
1 Assignment
0 Petitions
Accused Products
Abstract
A nonvolatile microcontroller (or microprocessor) with improved security against tampering, including attempts at active intrusion. According to this invention, a battery-backed microcontroller includes encryption and power management functions, and is combined with a battery and a volatile semiconductor memory (e.g. an SRAM). The microcontroller supplies power to the semiconductor memory (either from a system power supply or from the battery). When a security violation is detected, the microcontroller wipes its encryption registers, and also grounds the power-output pin to the memory. This will destroy all data in the volatile memory.
-
Citations
14 Claims
-
1. A nonvolatile microprocessor-controlled module, comprising:
-
encryption circuitry, said encryption circuitry including encryption registers; power management circuitry having power input nodes; a battery, said power input nodes coupled to said battery and to an external power supply terminal; a volatile memory; security violation detectors to detect a security violation; a microcontroller coupled to supply power via said power management circuitry to said volatile memory and to control said encryption registers, said security violation detectors coupled to said microcontroller; and wherein when a security violation is detected by said security violation detectors, said security violation detectors rewrite said encryption registers to a known value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification