Secure processor and a program for a secure processor
First Claim
Patent Images
1. A processor comprising:
- a key memory circuit configured to store a key;
an instruction code memory circuit configured to store a first program in a non-rewritable format;
an authentication circuit configured to authenticate the first program by using the key and an electronic signature corresponding to the first program;
a secure core circuit configured to execute the first program which is authenticated by the authentication circuit, the key memory circuit being connected to the secure core circuit; and
a normal core circuit physically separated from the secure core circuit and configured to be booted in response to the execution of the first program by the secure core circuit, the normal core circuit being configured to execute a second program which is not authenticated by the authentication circuit after being booted, the key memory circuit not being connected to the normal core circuit.
1 Assignment
0 Petitions
Accused Products
Abstract
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside.
71 Citations
52 Claims
-
1. A processor comprising:
-
a key memory circuit configured to store a key; an instruction code memory circuit configured to store a first program in a non-rewritable format; an authentication circuit configured to authenticate the first program by using the key and an electronic signature corresponding to the first program; a secure core circuit configured to execute the first program which is authenticated by the authentication circuit, the key memory circuit being connected to the secure core circuit; and a normal core circuit physically separated from the secure core circuit and configured to be booted in response to the execution of the first program by the secure core circuit, the normal core circuit being configured to execute a second program which is not authenticated by the authentication circuit after being booted, the key memory circuit not being connected to the normal core circuit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A processor comprising:
-
a key memory circuit configured to store a key; an instruction code memory circuit configured to store a first program in a non-rewritable format; an authentication circuit configured to authenticate a second program by an execution of the first program by using the key and an electronic signature corresponding to the second program; a secure core circuit configured to execute the second program which is authenticated by the authentication circuit, the key memory circuit being connected to the secure core circuit; and a normal core circuit physically separated from the secure core circuit and configured to be booted in response to the execution of the second program by the secure core circuit, the normal core circuit being configured to execute a third program which is not authenticated by the authentication circuit after being booted, the key memory circuit not being connected to the normal core circuit. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A processor comprising:
-
a key memory circuit configured to store a key; an instruction code memory circuit configured to store a first program in a non-rewritable format; an authentication circuit configured to authenticate the first program by using the key and an electronic signature corresponding to the first program; a secure core circuit configured to execute the first program which is authenticated by the authentication circuit, the key memory circuit being accessible from the secure core circuit; and a normal core circuit physically separated from the secure core circuit and configured to be booted in response to the execution of the first program by the secure core circuit, the normal core circuit being configured to execute a second program which is not authenticated by the authentication circuit after being booted, the key memory circuit not being accessible from the normal core circuit. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A processor comprising:
-
a key memory circuit configured to store a key; an instruction code memory circuit configured to store a first program in a non-rewritable format; an authentication circuit configured to authenticate a second program by an execution of the first program by using the key and an electronic signature corresponding to the second program; a secure core circuit configured to execute the second program which is authenticated by the authentication circuit, the key memory circuit being accessible from the secure core circuit; and a normal core circuit physically separated from the secure core circuit and configured to be booted in response to the execution of the second program by the secure core circuit, the normal core circuit being configured to execute a third program which is not authenticated by the authentication circuit after being booted, the key memory circuit not being accessible from the normal core circuit. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52)
-
Specification