Authentication chip with protection from power supply attacks
First Claim
Patent Images
1. An authentication chip including a volatile memory for containing an authentication key and further including a detection unit to prevent power supply attacks, the detection unit comprising:
- a first comparator having a first input connected to a reference voltage and a second input connected to a power supply line to detect power supply voltage rises above a predetermined limit, and a second comparator having a first input connected to the reference voltage and a second input connected to the power supply line to detect power supply voltage drops below a predetermined limit, and an output to provide a signal to clear said volatile memory, in the event of the power supply voltage being outside the predetermined limits.
3 Assignments
0 Petitions
Accused Products
Abstract
This invention concerns an authentication chip including an OverUnderPower detection unit to prevent power supply attacks. The unit comprises: a first comparator to detect voltage rises above a predetermined limit, and a second comparator connected to detect voltage drops below a predetermined limit. The output provides a RESET signal to clear all volatile memory in the chip in the event of the power supply voltage exceeding the predetermined limits.
-
Citations
4 Claims
-
1. An authentication chip including a volatile memory for containing an authentication key and further including a detection unit to prevent power supply attacks, the detection unit comprising:
- a first comparator having a first input connected to a reference voltage and a second input connected to a power supply line to detect power supply voltage rises above a predetermined limit, and a second comparator having a first input connected to the reference voltage and a second input connected to the power supply line to detect power supply voltage drops below a predetermined limit, and an output to provide a signal to clear said volatile memory, in the event of the power supply voltage being outside the predetermined limits.
- View Dependent Claims (2, 3, 4)
Specification