TWI864389B - Power supplying device, method and secure system - Google Patents
Power supplying device, method and secure system Download PDFInfo
- Publication number
- TWI864389B TWI864389B TW111115605A TW111115605A TWI864389B TW I864389 B TWI864389 B TW I864389B TW 111115605 A TW111115605 A TW 111115605A TW 111115605 A TW111115605 A TW 111115605A TW I864389 B TWI864389 B TW I864389B
- Authority
- TW
- Taiwan
- Prior art keywords
- voltage
- switch
- power supply
- encryption
- driving voltage
- Prior art date
Links
Images
Landscapes
- Power Sources (AREA)
- Direct Current Feeding And Distribution (AREA)
Abstract
Description
本發明涉及一種用於電源供應裝置、方法與安全系統,且特別是可以避免駭客(hacker)惡意透過偵測電源的系統電壓變化及其相應的電流值變化來竊取安全資訊的電源供應裝置、方法與安全系統。The present invention relates to a power supply device, method and security system, and in particular to a power supply device, method and security system that can prevent hackers from maliciously stealing security information by detecting changes in system voltage of a power supply and changes in corresponding current values.
近年來,安全應用已在許多領域實施,包括身份證、信用卡、計算機訪問控制和移動電話(例如,SIM卡)。 這些應用程序通常依賴於基於嵌入在存儲器中的密鑰的加密計算來實現高安全性。駭客會試圖從卡中提取這些密鑰以生成未經授權的交易。側通道攻擊(side attack)是在正常運行期間,從卡或計算機系統收集信息的最常用方法。它可以根據時序信息、功耗和電磁場對密鑰進行解密。 因此,保持數據安全並避免側通道攻擊是設計安全系統時需要考量的因素。In recent years, security applications have been implemented in many areas, including identity cards, credit cards, computer access control, and mobile phones (e.g., SIM cards). These applications usually rely on cryptographic calculations based on keys embedded in memory to achieve high security. Hackers will try to extract these keys from the card to generate unauthorized transactions. Side channel attacks are the most common method to collect information from a card or computer system during normal operation. It can decrypt the keys based on timing information, power consumption, and electromagnetic fields. Therefore, keeping data secure and avoiding side channel attacks are factors that need to be considered when designing a secure system.
電源側通道攻擊的情況說明如下。駭客可以在加解密裝置(透過多個邏輯閘實現)的邏輯閘切換期間,檢測電流變化及由此電流變化產生的電源特徵,通常施加至加解密裝置的驅動電壓也會跟著電流變化而改變。這些電源特徵可以由電源接腳監控並用於恢復密鑰。為了禁止從邏輯閘讀取電源和接地信號,通常會將電源接腳和接地接腳與外部焊盤(pad)隔離。The power side channel attack scenario is as follows. During the switching of the logic gates of the encryption device (implemented by multiple logic gates), the hacker can detect the current change and the power characteristics generated by the current change. Usually, the driving voltage applied to the encryption device will also change with the current change. These power characteristics can be monitored by the power pins and used to recover the key. In order to prohibit the reading of power and ground signals from the logic gate, the power pins and ground pins are usually isolated from the external pads.
請參照圖1,圖1是先前技術的安全系統的電路圖。安全系統1包括電源10、電源供應裝置12與加解密裝置14,其中電源供應裝置12電性連接於電源10與加解密裝置14之間,以藉此避免駭客透過偵測電源10的電源接腳與接地接腳便可以獲取關聯於安全資訊的電源特徵。電源供應裝置12包括多個開關SW1~SW5與電荷儲存電容CS。開關SW1的一端電性連接電源10的系統電壓,開關SW1的另一端電性連接開關SW2的一端、開關SW5的一端與電荷儲存電容CS的一端。開關SW2的另一端電性連接加解密裝置14的一端,並藉此輸出供應電壓給加解密裝置14作為加解密裝置14的驅動電壓。開關SW3的一端電性連接電源10的接地電壓。開關SW3的另一端電性連接開關SW4的一端、開關SW5的另一端與電荷儲存電容CS的另一端。開關SW4的另一端電性連接加解密裝置14的另一端,以提供接地電壓給加解密裝置14。Please refer to FIG. 1, which is a circuit diagram of a security system of the prior art. The security system 1 includes a power supply 10, a power supply device 12, and an encryption device 14, wherein the power supply device 12 is electrically connected between the power supply 10 and the encryption device 14 to prevent hackers from obtaining power supply characteristics related to security information by detecting the power pins and ground pins of the power supply 10. The power supply device 12 includes a plurality of switches SW1 to SW5 and a charge storage capacitor CS. One end of the switch SW1 is electrically connected to the system voltage of the power supply 10, and the other end of the switch SW1 is electrically connected to one end of the switch SW2, one end of the switch SW5, and one end of the charge storage capacitor CS. The other end of the switch SW2 is electrically connected to one end of the encryption device 14, thereby outputting a supply voltage to the encryption device 14 as a driving voltage of the encryption device 14. One end of the switch SW3 is electrically connected to the ground voltage of the power source 10. The other end of the switch SW3 is electrically connected to one end of the switch SW4, the other end of the switch SW5 and the other end of the charge storage capacitor CS. The other end of the switch SW4 is electrically connected to the other end of the encryption device 14 to provide a ground voltage to the encryption device 14.
電源供應裝置12提供供應電壓的流程如下。首先,在第一階段,僅有開關SW5導通,其他開關SW1~SW4斷路,以對電荷儲存電容CS放電至特定的電壓準位,即開關SW5當作重置開關使用。在第二階段,開關SW1、SW3導通,其他開關SW2、SW4、SW5斷路,故電源10的系統電壓可對電荷儲存電容CS進行充電,在充電到系統電壓的電壓準位後,才進入第三階段。在第三階段, 開關SW2、SW4導通,其他開關SW1、SW3、SW5斷路,電荷儲存電容CS提供供應電壓給加解密裝置14作為驅動電壓。然後,在第四階段,加解密裝置14才被允許進行加解密。在結束第四階段後,再次回到第一階段。The process of the power supply device 12 providing the supply voltage is as follows. First, in the first stage, only the switch SW5 is turned on, and the other switches SW1 to SW4 are turned off to discharge the charge storage capacitor CS to a specific voltage level, that is, the switch SW5 is used as a reset switch. In the second stage, the switches SW1 and SW3 are turned on, and the other switches SW2, SW4, and SW5 are turned off, so the system voltage of the power supply 10 can charge the charge storage capacitor CS. After charging to the voltage level of the system voltage, it enters the third stage. In the third stage, the switches SW2 and SW4 are turned on, and the other switches SW1, SW3, and SW5 are turned off, and the charge storage capacitor CS provides the supply voltage to the encryption and decryption device 14 as a driving voltage. Then, in the fourth stage, the encryption and decryption device 14 is allowed to perform encryption and decryption. After the fourth stage is finished, it returns to the first stage again.
透過上述做法,雖可以避免駭客透過偵測電源10的電源接腳與接地接腳來獲取關聯於安全資訊的電源特徵,但上述做法必須確保電荷儲存電容CS儲存的電荷量必須能夠供應加解密裝置14進行加解密時所消耗的大量電荷,因此這導致電荷儲存電容CS的尺寸必須足夠大。再者,上述做法不是一種省電的解決方案,因為上述做法必須在第一階段將電荷儲存電容CS放電至預定電壓準位。另外,電荷儲存電容CS的尺寸越大,充放電時間也會越久,整體來說會較為耗時,更不用說,上述做法還共需要四個階段來確保加解密裝置14可以正常工作。Through the above method, although it is possible to prevent hackers from obtaining power supply characteristics related to security information through the power pin and the ground pin of the detection power supply 10, the above method must ensure that the amount of charge stored in the charge storage capacitor CS must be able to supply the large amount of charge consumed by the encryption and decryption device 14 during encryption and decryption, so this results in the size of the charge storage capacitor CS must be large enough. Furthermore, the above method is not a power-saving solution, because the above method must discharge the charge storage capacitor CS to a predetermined voltage level in the first stage. In addition, the larger the size of the charge storage capacitor CS, the longer the charging and discharging time will be, which will be more time-consuming overall, not to mention that the above method requires a total of four stages to ensure that the encryption and decryption device 14 can work normally.
本發明實施例提供一種電源供應裝置,係用於提供電源給安全系統的加解密裝置,且包括安全電力提供裝置、穩定電壓源、電壓偵測電路與切換開關。安全電力提供裝置用於根據系統電壓提供供應電壓。穩定電壓源用於提供穩定電壓。電壓選取裝置電性連接加解密裝置、安全電力提供裝置與穩定電壓源,用於在加解密裝置的驅動電壓小於下限電壓時,選取穩定電壓與供應電壓同時作為加解密裝置的驅動電壓,以及用於在加解密裝置的驅動電壓未於下限電壓時,選取供應電壓作為驅動電壓。The embodiment of the present invention provides a power supply device for providing power to an encryption device of a security system, and includes a security power supply device, a stable voltage source, a voltage detection circuit and a switch. The security power supply device is used to provide a supply voltage according to a system voltage. The stable voltage source is used to provide a stable voltage. The voltage selection device is electrically connected to the encryption device, the safety power supply device and the stable voltage source, and is used to select the stable voltage and the supply voltage as the driving voltage of the encryption device when the driving voltage of the encryption device is less than the lower limit voltage, and to select the supply voltage as the driving voltage when the driving voltage of the encryption device is not less than the lower limit voltage.
本發明實施例還提供一種安全系統,此安全系統包括上述電源供應裝置與加解密裝置。The embodiment of the present invention also provides a security system, which includes the power supply device and the encryption and decryption device.
本發明實施例還提供一種電源供應方法,此電源供應方法係用於提供電源給安全系統的加解密裝置,並具有以下步驟。判斷加解密裝置的驅動電壓是否小於下限電壓。若加解密裝置的驅動電壓小於下限電壓,則同時使用安全電力提供裝置的供應電壓與穩定電壓源的穩定電壓作為驅動電壓。若加解密裝置的驅動電壓未小於下限電壓,則使用供應電壓作為驅動電壓。The embodiment of the present invention also provides a power supply method, which is used to provide power to the encryption and decryption device of the security system, and has the following steps. Determine whether the driving voltage of the encryption and decryption device is less than the lower limit voltage. If the driving voltage of the encryption and decryption device is less than the lower limit voltage, the supply voltage of the security power supply device and the stable voltage of the stable voltage source are used as the driving voltage at the same time. If the driving voltage of the encryption and decryption device is not less than the lower limit voltage, the supply voltage is used as the driving voltage.
綜上所述,相較於先前技術,本發明實施例提供的多種不同電源供應裝置、方法與安全系統可以達到減少電荷儲存電容所需要的尺寸、操作時間、耗電電流與電路面積等技術效果的至少一者。本發明實施例的電源供應裝置可以有效地保護安全系統,並避免駭客透過電源接腳與接地接腳偵測出來的電源特徵獲取安全資訊。In summary, compared with the prior art, the various power supply devices, methods and security systems provided by the embodiments of the present invention can achieve at least one of the technical effects of reducing the size, operation time, power consumption current and circuit area required for the charge storage capacitor. The power supply device of the embodiments of the present invention can effectively protect the security system and prevent hackers from obtaining security information through the power characteristics detected by the power pins and the ground pins.
為了進一步理解本發明的技術、手段和效果,可以參考以下詳細描述和附圖,從而可以徹底和具體地理解本發明的目的、特徵和概念。然而,以下詳細描述和附圖僅用於參考和說明本發明的實現方式,其並非用於限制本發明。In order to further understand the technology, means and effects of the present invention, reference may be made to the following detailed description and accompanying drawings, so that the purpose, features and concepts of the present invention can be thoroughly and specifically understood. However, the following detailed description and accompanying drawings are only used for reference and explanation of the implementation of the present invention, and are not used to limit the present invention.
現在將詳細參考本發明的示範實施例,其示範實施例會在附圖中被繪示出。在可能的情況下,在附圖和說明書中使用相同的元件符號來指代相同或相似的部件。另外,示範實施例的做法僅是本發明的設計概念的實現方式之一,下述的該等示範皆非用於限定本發明。Reference will now be made in detail to exemplary embodiments of the present invention, which are illustrated in the accompanying drawings. Where possible, the same reference numerals are used in the drawings and the specification to refer to the same or similar components. In addition, the exemplary embodiments are only one of the implementation methods of the design concept of the present invention, and the following examples are not intended to limit the present invention.
為解決先前技術的問題,本發明實施例提供的多種不同電源供應裝置、方法與安全系統可以避免駭客透過電源接腳與接地接腳偵測出來的電源特徵獲取安全資訊,且在達到安全保護效果時,還能達到減少電荷儲存電容所需要的尺寸、操作時間、耗電電流與電路面積等技術效果的至少一者。To solve the problems of the prior art, the various power supply devices, methods and security systems provided by the embodiments of the present invention can prevent hackers from obtaining security information through the power characteristics detected by the power pins and the ground pins, and while achieving the security protection effect, can also achieve at least one of the technical effects of reducing the size, operation time, power consumption current and circuit area required for the charge storage capacitor.
在本發明實施例中,電源供應裝置包括安全電力提供裝置、電壓偵測電路、穩定電壓源與切換開關。透過電壓偵測電路判斷加解密裝置的驅動電壓是否不足,來控制切換開關的導通與斷路,以決定僅由安全電力提供裝置提供供應電壓給加解密裝置作為驅動電壓,還是同時由安全電力提供裝置與穩定電壓源同時提供供應電壓與穩定電壓加解密裝置作為驅動電壓。換言之,一旦驅動電壓下降(即,加解密裝置進行加解密,而消耗了較大的電流),穩定電壓源(例如,由能隙電壓產生器、低壓降穩壓器等直流轉直流轉換裝置實現)即立刻將穩定電壓提供給加解密裝置作為驅動電壓的一部分,以確保加解密裝置能夠正常工作。由於電壓偵測電路是即時地對加解密裝置進行偵測,故不用讓安全電力提供裝置一定要進行如先前技術的四個階段的充放電,因此有效減少電荷儲存電容所需要的尺寸、操作時間、耗電電流與電路面積。In the embodiment of the present invention, the power supply device includes a safety power supply device, a voltage detection circuit, a stable voltage source and a switch. The voltage detection circuit determines whether the driving voltage of the encryption device is insufficient to control the on and off of the switch to determine whether only the safety power supply device provides the supply voltage to the encryption device as the driving voltage, or whether the safety power supply device and the stable voltage source simultaneously provide the supply voltage and the stable voltage encryption device as the driving voltage. In other words, once the driving voltage drops (i.e., the encryption device performs encryption and decryption and consumes a large current), the stable voltage source (for example, implemented by a DC-to-DC converter such as a bandgap voltage generator or a low-dropout voltage regulator) immediately provides the stable voltage to the encryption device as part of the driving voltage to ensure that the encryption device can work normally. Since the voltage detection circuit detects the encryption device in real time, the safe power supply device does not have to perform four stages of charging and discharging as in the prior art, thereby effectively reducing the size, operation time, power consumption current and circuit area required for the charge storage capacitor.
附帶一提的是,上述切換開關與電壓偵測電路可以整合成電壓選取裝置。電壓選取裝置電性連接加解密裝置、安全電力提供裝置與穩定電壓源。在加解密裝置的驅動電壓未小於下限電壓時,電壓選取裝置選取供應電壓作為驅動電壓;以及在加解密裝置的驅動電壓小於下限電壓時,電壓選取裝置選取供應電壓及穩定電壓同時作為驅動電壓。再者,於另一個實施例中,也可以設計成,在加解密裝置的驅動電壓小於下限電壓時,電壓選取裝置僅選取穩定電壓同時作為驅動電壓。Incidentally, the switching switch and the voltage detection circuit can be integrated into a voltage selection device. The voltage selection device is electrically connected to the encryption device, the safety power supply device and the stable voltage source. When the driving voltage of the encryption device is not less than the lower limit voltage, the voltage selection device selects the supply voltage as the driving voltage; and when the driving voltage of the encryption device is less than the lower limit voltage, the voltage selection device selects the supply voltage and the stable voltage as the driving voltage at the same time. Furthermore, in another embodiment, it can also be designed that when the driving voltage of the encryption device is less than the lower limit voltage, the voltage selection device only selects the stable voltage as the driving voltage at the same time.
首先,請參照圖2,請參照圖2,圖2是本發明實施例的安全系統的電路圖。安全系統2包括電源供應裝置20與加解密裝置22,其中電源供應裝置20包括穩定電壓源200、安全電力提供裝置202、電壓偵測電路204與切換開關206。電源供應裝置20係用於提供電源給安全系統2的加解密裝置22,其主要目的是為了使駭客無法透過偵測電源接腳與接地接腳得到的電源特徵變化(即,系統電壓的電源特徵變化)來獲得安全資訊。換言之,加解密裝置22進行加解密的過程中,也不會讓系統電壓的電源特徵有大幅度的變化。First, please refer to FIG. 2, which is a circuit diagram of a security system according to an embodiment of the present invention. The security system 2 includes a power supply device 20 and an encryption device 22, wherein the power supply device 20 includes a stable voltage source 200, a safe
安全電力提供裝置202用於根據系統電壓產生供應電壓,並提供供應電壓,其中供應電壓施加於加解密裝置22,以作為驅動加解密裝置22的驅動電壓VDIG的一部分或全部(關聯於切換開關206的導通與斷路)。透過安全電力提供裝置202,在加解密裝置22進行加解密時,系統電壓的電源特徵變化幅度小於特定幅度,例如,電流或電壓變化幅度小於5%,但本發明不以此為限制。然而,僅有安全電力提供裝置202提供供應電壓做為加解密裝置22的驅動電壓VDIG時,有可能無法提供足夠的輸出總電流給加解密裝置22作為在進行加解密所需要的消耗的電流(若安全電力提供裝置202無較大的電荷儲存電容或無足夠的切換電流單元)。因此,穩定電壓源200、切換開關206與電壓偵測電路204設置於電源供應裝置20中,以解決上述技術問題。The safety
穩定電壓源200用於提供不易受到變動的穩定電壓,其中穩定電壓源200可以是由能隙電壓產生器、低壓降穩壓器等直流轉直流轉換裝置實現,例如但不限是由圖6的穩定電壓源300來實現,其由PMOS電晶體MP1、比較器CMP1與電阻R1構成的能隙參考電壓電路實現,並用於提供較低的系統電壓DVDD(低於系統電壓VDD)作為穩定電壓。電壓偵測電路204電性連接加解密裝置22,用於根據加解密裝置22的驅動電壓VDIG產生開關信號。電壓偵測電路204可以是使用比較器來實現,其中比較器的用於接收加解密裝置22的驅動電壓VDIG,比較器的正輸入端用於接收下限電壓VTG-Δ,且下限電壓VTG-Δ的電壓值為驅動電壓VDIG的目標電壓值VTG減去差異量電壓值Δ。要注意的是,本發明的電壓偵測電路204的實現不以比較器為限制。切換開關206具有第一端、第二端與控制端,其中第一端電性連接穩定電壓源200,第二端電性連接加解密裝置22,以及控制端電性連接電壓偵測電路204以接收第一開關信號。切換開關206的導通或斷路(即,第一端與第二端的導通或斷路)由第一開關信號所控制。The stabilized voltage source 200 is used to provide a stable voltage that is not susceptible to changes, wherein the stabilized voltage source 200 can be implemented by a DC-to-DC converter such as a bandgap voltage generator, a low-dropout voltage regulator, etc., for example but not limited to the stabilized voltage source 300 of FIG. 6 , which is implemented by a bandgap reference voltage circuit composed of a PMOS transistor MP1, a comparator CMP1, and a resistor R1, and is used to provide a lower system voltage DVDD (lower than the system voltage VDD) as a stable voltage. The voltage detection circuit 204 is electrically connected to the encryption device 22, and is used to generate a switch signal according to the drive voltage VDIG of the encryption device 22. The voltage detection circuit 204 can be implemented using a comparator, wherein the comparator is used to receive the driving voltage VDIG of the encryption device 22, and the positive input terminal of the comparator is used to receive the lower limit voltage VTG-Δ, and the voltage value of the lower limit voltage VTG-Δ is the target voltage value VTG of the driving voltage VDIG minus the difference voltage value Δ. It should be noted that the implementation of the voltage detection circuit 204 of the present invention is not limited to the comparator. The switching switch 206 has a first end, a second end and a control end, wherein the first end is electrically connected to the stable voltage source 200, the second end is electrically connected to the encryption device 22, and the control end is electrically connected to the voltage detection circuit 204 to receive the first switch signal. The conduction or disconnection of the switch 206 (ie, the conduction or disconnection between the first terminal and the second terminal) is controlled by the first switch signal.
當加解密裝置22進行加解密時,加解密裝置22的消耗電流增加,加解密裝置22的驅動電壓VDIG下降。當驅動電壓VDIG小於下限電壓VTG-Δ時,第一開關信號會使得切換開關206導通,此時加解密裝置22接收穩定電壓與供應電壓作為驅動電壓VDIG,即驅動電壓VDIG由兩部分組成,其中一部分是穩定電壓,另一部分則是供應電壓。如此,可以確保加解密裝置22有足夠的電流可以使用,而能正常地進行加解密。When the encryption and decryption device 22 performs encryption and decryption, the current consumption of the encryption and decryption device 22 increases, and the driving voltage VDIG of the encryption and decryption device 22 decreases. When the driving voltage VDIG is less than the lower limit voltage VTG-Δ, the first switch signal turns on the switching switch 206, and the encryption and decryption device 22 receives the stable voltage and the supply voltage as the driving voltage VDIG, that is, the driving voltage VDIG consists of two parts, one of which is the stable voltage and the other is the supply voltage. In this way, it can be ensured that the encryption and decryption device 22 has sufficient current to use and can perform encryption and decryption normally.
當驅動電壓VDIG仍大於下限電壓VTG-Δ時,第一開關信號會使得切換開關206斷路,故仍由安全電力提供裝置202提供供應電壓作為驅動電壓VDIG的全部。較佳地,安全電力提供裝置202被設計成在驅動電壓VDIG下降但仍大於下限電壓VTG-Δ時,可以增加安全電力提供裝置202的輸出總電流,以提升驅動電壓VDIG的電壓值。When the driving voltage VDIG is still greater than the lower limit voltage VTG-Δ, the first switch signal will cause the switching switch 206 to be disconnected, so the supply voltage is still provided by the safety
附帶一提的是,電源供應裝置20更可以保括並聯於加解密裝置22的電容與/或並聯於加解密裝置22的漣波抑制單元(圖未繪示)。透過並聯於加解密裝置22的電容與/或並聯於加解密裝置22的漣波抑制單元,可以更有效維持驅動電壓的穩定,其中漣波抑制單元可以是一個閘極接收固定偏壓的電晶體,此電晶體的源極與汲極分別接收驅動電壓VDIG與低電壓(例如,接地電壓),故能夠減少驅動電壓VDIG變動時的漣波。Incidentally, the power supply device 20 may further include a capacitor connected in parallel to the encryption device 22 and/or a ripple suppression unit connected in parallel to the encryption device 22 (not shown). The capacitor connected in parallel to the encryption device 22 and/or the ripple suppression unit connected in parallel to the encryption device 22 can more effectively maintain the stability of the driving voltage, wherein the ripple suppression unit may be a transistor whose gate receives a fixed bias, and the source and drain of the transistor receive the driving voltage VDIG and a low voltage (e.g., a ground voltage) respectively, so that the ripple when the driving voltage VDIG changes can be reduced.
接著,請參照圖3,圖3是本發明實施例的安全電力提供裝置的電路圖。安全電力提供裝置202的其中一種實現方式如圖3,但本發明不以此為限制。安全電力提供裝置202包括開關SW1~SW5與電荷儲存電容CS。開關SW1的兩端分別電性連接系統電壓VDD與開關SW2的一端。開關SW2的另一端用於輸出供應電壓作為驅動電壓VDIG的一部分或全部。開關SW3的兩端電性連接低電壓(例如,接地電壓)與開關SW4的一端。開關SW4的另一端電性連接開關SW3的另一端。開關SW5的兩端分別電性連接電荷儲存電容CS的兩端。開關SW5作為放電開關使用,用以提供放電路徑,但於本發明中並非必要構件,而可以選擇性地移除。Next, please refer to Figure 3, which is a circuit diagram of a safe power supply device of an embodiment of the present invention. One implementation of the safe
電荷儲存電容CS的一端電性連接開關SW1的另一端與開關SW2的一端,以及電荷儲存電容CS的另一端電性連接開關SW3的另一端與開關SW3的一端。開關SW1~SW4受控於多個第二開關信號,以及開關SW5受控於重置信號,其中多個第二開關信號與可以如先前技術所述,用於控制電荷儲存電容CS於四個階段進行充放電。附帶一提的是,開關SW5於本發明中並非必要構件,而可以選擇性地移除,即可以不用對電荷儲存電容CS的電壓準位進行重置。One end of the charge storage capacitor CS is electrically connected to the other end of the switch SW1 and one end of the switch SW2, and the other end of the charge storage capacitor CS is electrically connected to the other end of the switch SW3 and one end of the switch SW3. The switches SW1 to SW4 are controlled by a plurality of second switch signals, and the switch SW5 is controlled by a reset signal, wherein the plurality of second switch signals can be used to control the charge storage capacitor CS to charge and discharge in four stages as described in the prior art. Incidentally, the switch SW5 is not a necessary component in the present invention, and can be selectively removed, that is, the voltage level of the charge storage capacitor CS does not need to be reset.
接著,請參照圖4,圖4是本發明實施例的安全電力提供裝置的另一種電路圖。安全電力提供裝置202的其中另一種實現方式如圖3,但本發明不以此為限制。安全電力提供裝置202包括多個切換電流單元CU1~CUn,其中多個切換電流單元CU1~CUn的多個端電性連接系統電壓VDD,多個切換電流單元CU1~CUn的另外多個端彼此電性連接,並用於輸出供應電壓作為驅動電壓VDIG的一部分或全部,且多個切換電流單元CU1~CUn受控於多個第二開關信號。Next, please refer to FIG. 4, which is another circuit diagram of the safety power supply device of the embodiment of the present invention. Another implementation of the safety
切換電流單元CU1包括電流源CR1與開關SC1,其中電流源CR1的一端電性連接系統電壓VDD,開關SC1的兩端分別電性連接電流源CR1的另一端與系統電壓VDD,以及開關SC1受控於第二開關信號。同樣地,切換電流單元CUn包括電流源CRn與開關SCn,且電流源CRn與開關SCn的電性連接方式類似於電流源CR1與開關SC1的電性連接方式,故不贅述。當加解密裝置22進行加解密,使驅動電壓VDIG下降,但不小於下限電壓VTG-Δ時,多個切換電流單元CU1~CUn被多個第二開關信號控制,以增加多個切換電流單元CU1~CUn的輸出總電流來提升驅動電壓VDIG的電壓值。The switching current unit CU1 includes a current source CR1 and a switch SC1, wherein one end of the current source CR1 is electrically connected to the system voltage VDD, two ends of the switch SC1 are electrically connected to the other end of the current source CR1 and the system voltage VDD, and the switch SC1 is controlled by a second switch signal. Similarly, the switching current unit CUn includes a current source CRn and a switch SCn, and the electrical connection method of the current source CRn and the switch SCn is similar to the electrical connection method of the current source CR1 and the switch SC1, so it is not repeated. When the encryption and decryption device 22 performs encryption and decryption, causing the driving voltage VDIG to decrease but not less than the lower limit voltage VTG-Δ, multiple switching current units CU1~CUn are controlled by multiple second switch signals to increase the total output current of the multiple switching current units CU1~CUn to increase the voltage value of the driving voltage VDIG.
請接著參照圖5,圖5是本發明實施例的電源供應方法的流程圖。此電源電源供應方法用於提供電源給安全系統的加解密裝置,可以由上述電源供應裝置來執行,且包括以下步驟。首先,在步驟S102,初始狀態是由安全電力提供裝置提供供應電壓給加解密裝置作為驅動電壓。接著,在步驟S104,加解密裝置開始進行加解密。於步驟S106中,判斷加解密裝置的驅動電壓是否小於下限電壓。如果加解密裝置的驅動電壓未小於下限電壓,則執行步驟S108A;相反地,如果加解密裝置的驅動電壓小於下限電壓,則執行步驟S108B。Please refer to FIG. 5, which is a flow chart of a power supply method of an embodiment of the present invention. This power supply method is used to provide power to the encryption and decryption device of the security system, which can be executed by the above-mentioned power supply device and includes the following steps. First, in step S102, the initial state is that the security power supply device provides a supply voltage to the encryption and decryption device as a driving voltage. Then, in step S104, the encryption and decryption device starts encryption and decryption. In step S106, it is determined whether the driving voltage of the encryption and decryption device is less than the lower limit voltage. If the driving voltage of the encryption/decryption device is not less than the lower limit voltage, step S108A is executed; on the contrary, if the driving voltage of the encryption/decryption device is less than the lower limit voltage, step S108B is executed.
在步驟S108A中,因加解密裝置的驅動電壓未小於下限電壓,故繼續由安全電力提供裝置提供供應電壓給加解密裝置作為驅動電壓。在步驟S108B中,因加解密裝置的驅動電壓未小於下限電壓,由安全電力提供裝置以及穩定電壓源分別提供供應電壓與穩定電壓給加解密裝置作為驅動電壓,以避免加解密裝置因為驅動電流或驅動電壓不足,而無法順利進行加解密的工作。In step S108A, since the driving voltage of the encryption device is not less than the lower limit voltage, the safety power supply device continues to provide the supply voltage to the encryption device as the driving voltage. In step S108B, since the driving voltage of the encryption device is not less than the lower limit voltage, the safety power supply device and the stable voltage source respectively provide the supply voltage and the stable voltage to the encryption device as the driving voltage, so as to avoid the encryption device being unable to perform encryption and decryption smoothly due to insufficient driving current or driving voltage.
在此請注意,雖然上述方法是限定在加解密裝置有進行加解密時,才選取驅動電壓的來源,然而,本發明卻不限定於此。在其他實施例中,可以不考慮是否正在進行加解密,當驅動電壓小於下限電壓,則同時使用穩定電壓與供應電壓作為驅動電壓。Please note that although the above method is limited to selecting the source of the driving voltage when the encryption device is performing encryption and decryption, the present invention is not limited to this. In other embodiments, it is not necessary to consider whether encryption and decryption are being performed. When the driving voltage is less than the lower limit voltage, the stable voltage and the supply voltage are used as the driving voltage at the same time.
綜合以上所述,本發明實施例提供的多種電源供應裝置、方法與安全系統都可以達到避免駭客偵測電源接腳與接地接腳來獲取安全資訊的技術效果,而且,相較於先前技術,本發明實施例的多種電源供應裝置、方法與安全系統還能夠有效減少電荷儲存電容所需要的尺寸、操作時間、耗電電流與電路面積。另外,附帶一提的是,本發明實施例的多種電源供應裝置、方法與安全系統的系統複雜度並不高,故易於實現,且無須龐大的製造成本,因此,本發明實施例的多種電源供應裝置、方法與安全系統具有極高的實用性與市場價值。In summary, the various power supply devices, methods and security systems provided by the embodiments of the present invention can achieve the technical effect of preventing hackers from detecting power pins and ground pins to obtain security information. Moreover, compared with the prior art, the various power supply devices, methods and security systems of the embodiments of the present invention can also effectively reduce the size, operation time, power consumption current and circuit area required for the charge storage capacitor. In addition, it is mentioned that the system complexity of the various power supply devices, methods and security systems of the embodiments of the present invention is not high, so it is easy to implement and does not require a huge manufacturing cost. Therefore, the various power supply devices, methods and security systems of the embodiments of the present invention have extremely high practicality and market value.
應當理解,本文描述的示例和實施例僅用於說明目的,並且鑑於其的各種修改或改變將被建議給本領域技術人員,並且將被包括在本申請的精神和範圍以及所附權利要求的範圍之內。It should be understood that the examples and embodiments described herein are for illustrative purposes only and that various modifications or changes thereto will be suggested to those skilled in the art and are to be included within the spirit and scope of the present application and the scope of the appended claims.
1~3、3':安全系統 10:電源 12、20:電源供應裝置 14、22:加解密裝置 200:穩定電壓源 202:安全電力提供裝置 204:電壓偵測電路 206:切換開關 SW1~SW5:開關 CS:電荷儲存電容 VDIG:驅動電壓 VTG-Δ:下限電壓 DVDD、VDD:系統電壓 CU1~CUn:切換電流單元 CR1~CRn:電流源 SC1~SCn:開關 S102、S104、S106、S108A、S108B:步驟 MP1:PMOS電晶體 CMP1:比較器 R1:電阻 1~3, 3': Security system 10: Power supply 12, 20: Power supply device 14, 22: Encryption device 200: Stable voltage source 202: Safety power supply device 204: Voltage detection circuit 206: Switch SW1~SW5: Switch CS: Charge storage capacitor VDIG: Driving voltage VTG-Δ: Lower limit voltage DVDD, VDD: System voltage CU1~CUn: Switching current unit CR1~CRn: Current source SC1~SCn: Switch S102, S104, S106, S108A, S108B: Step MP1: PMOS transistor CMP1: Comparator R1: resistor
提供的附圖用以使本發明所屬技術領域具有通常知識者可以進一步理解本發明,並且被併入與構成本發明的說明書的一部分。附圖示出了本發明的示範實施例,並且用以與本發明的說明書一起用於解釋本發明的原理。The accompanying drawings are provided to enable a person with ordinary knowledge in the technical field to which the present invention belongs to further understand the present invention, and are incorporated into and constitute a part of the specification of the present invention. The accompanying drawings show exemplary embodiments of the present invention, and are used together with the specification of the present invention to explain the principle of the present invention.
圖1是先前技術的安全系統的電路圖。FIG. 1 is a circuit diagram of a safety system of the prior art.
圖2是本發明實施例的安全系統的電路圖。FIG. 2 is a circuit diagram of a safety system according to an embodiment of the present invention.
圖3是本發明實施例的安全電力提供裝置的電路圖。FIG. 3 is a circuit diagram of a safe power supply device according to an embodiment of the present invention.
圖4是本發明實施例的安全電力提供裝置的另一種電路圖。FIG. 4 is another circuit diagram of the safety power supply device according to the embodiment of the present invention.
圖5是本發明實施例的電源供應方法的流程圖。FIG5 is a flow chart of a power supply method according to an embodiment of the present invention.
圖6是本發明實施例的穩定電壓源的電路圖。FIG6 is a circuit diagram of a stable voltage source according to an embodiment of the present invention.
2:安全系統 2: Security system
20:電源供應裝置 20: Power supply device
22:加解密裝置 22: Encryption and decryption device
200:穩定電壓源 200:Stable voltage source
202:安全電力提供裝置 202: Safe power supply device
204:電壓偵測電路 204: Voltage detection circuit
206:切換開關 206: Switch
VDIG:驅動電壓 VDIG: driving voltage
VTG-Δ:下限電壓 VTG-Δ: lower limit voltage
Claims (10)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210512531.3A CN115879178A (en) | 2021-09-27 | 2022-05-12 | Power supply device, method and safety system |
| US17/951,517 US20230099825A1 (en) | 2021-09-27 | 2022-09-23 | Power supply device, method and secure system |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202163248664P | 2021-09-27 | 2021-09-27 | |
| US63/248,664 | 2021-09-27 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW202315288A TW202315288A (en) | 2023-04-01 |
| TWI864389B true TWI864389B (en) | 2024-12-01 |
Family
ID=86943034
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW111113053A TWI844836B (en) | 2021-09-27 | 2022-04-06 | Power supplying device, method and secure system |
| TW111113054A TWI861484B (en) | 2021-09-27 | 2022-04-06 | Power supplying device, method and security system |
| TW111115605A TWI864389B (en) | 2021-09-27 | 2022-04-25 | Power supplying device, method and secure system |
Family Applications Before (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW111113053A TWI844836B (en) | 2021-09-27 | 2022-04-06 | Power supplying device, method and secure system |
| TW111113054A TWI861484B (en) | 2021-09-27 | 2022-04-06 | Power supplying device, method and security system |
Country Status (1)
| Country | Link |
|---|---|
| TW (3) | TWI844836B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW201315082A (en) * | 2011-09-20 | 2013-04-01 | 富達通科技股份有限公司 | Inductive power supply and metal foreign matter detection method thereof |
| TW201432430A (en) * | 2013-02-01 | 2014-08-16 | Giga Byte Tech Co Ltd | Motherboard and method for power controlling thereof |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8525545B1 (en) * | 2011-08-26 | 2013-09-03 | Lockheed Martin Corporation | Power isolation during sensitive operations |
| US8912814B2 (en) * | 2012-11-12 | 2014-12-16 | Chaologix, Inc. | Clocked charge domain logic |
| TWI620094B (en) * | 2013-05-31 | 2018-04-01 | 凱爾拉吉克斯股份有限公司 | Charge distribution control system, crypto system and method of protecting against side channel attack by operating the same |
| US9509707B2 (en) * | 2014-06-24 | 2016-11-29 | Qualcomm Incorporated | Methods and systems for thwarting side channel attacks |
| FR3026206B1 (en) * | 2014-09-23 | 2017-12-01 | Inside Secure | METHOD OF CONTREPOSING AGAINST ATTACK BY ELECTRICAL CONSUMPTION ANALYSIS FOR CRYPTOGRAPHIC DEVICE |
| CN206505415U (en) * | 2016-12-30 | 2017-09-19 | 北京安天网络安全技术有限公司 | A kind of encryption authentication device based on PCIE |
| US10990682B2 (en) * | 2017-12-18 | 2021-04-27 | Nuvoton Technology Corporation | System and method for coping with fault injection attacks |
| TWI691155B (en) * | 2018-12-12 | 2020-04-11 | 新唐科技股份有限公司 | Switched-capacitor dc-dc power converter circuit |
-
2022
- 2022-04-06 TW TW111113053A patent/TWI844836B/en active
- 2022-04-06 TW TW111113054A patent/TWI861484B/en active
- 2022-04-25 TW TW111115605A patent/TWI864389B/en active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW201315082A (en) * | 2011-09-20 | 2013-04-01 | 富達通科技股份有限公司 | Inductive power supply and metal foreign matter detection method thereof |
| TW201432430A (en) * | 2013-02-01 | 2014-08-16 | Giga Byte Tech Co Ltd | Motherboard and method for power controlling thereof |
Also Published As
| Publication number | Publication date |
|---|---|
| TW202314441A (en) | 2023-04-01 |
| TW202314440A (en) | 2023-04-01 |
| TW202315288A (en) | 2023-04-01 |
| TWI861484B (en) | 2024-11-11 |
| TWI844836B (en) | 2024-06-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111226279B (en) | Hacking prevention mechanism for flash memory device | |
| CA1162648A (en) | Low-power battery backup circuit for semiconductor memory | |
| CN100382102C (en) | Smart card with protection circuit against power analysis attack and method of operation thereof | |
| JP6882856B2 (en) | Secure digital logical cell | |
| US10677839B2 (en) | Circuit and method for detecting a fault attack | |
| US11594962B2 (en) | Techniques to improve current regulator capability to protect the secured circuit from power side channel attack | |
| US20100169671A1 (en) | Cryptoprocessor with improved data protection | |
| US20210048466A1 (en) | Detection circuit of electromagnetic fault injection and security chip | |
| US9541583B2 (en) | Voltage detector with high voltage protection | |
| US8564324B2 (en) | Monitoring of the activity of an electronic circuit | |
| US10275017B2 (en) | Power circuit and memory device using the same | |
| EP3805767A1 (en) | Power glitch signal detection circuit, secure chip and electronic device | |
| KR20080099223A (en) | Nonvolatile Storage Devices and Methods | |
| JP2016526344A (en) | Secure system and protection method | |
| TWI864389B (en) | Power supplying device, method and secure system | |
| Seol et al. | Amnesiac DRAM: A proactive defense mechanism against cold boot attacks | |
| CN101924766A (en) | Double-network communication method | |
| CN115883051A (en) | Power supply device, method and safety system | |
| CN110336316B (en) | UPS parallel operation reverse irrigation prevention control method and device and terminal | |
| US10164425B2 (en) | Electrostatic discharge protection | |
| US20230099825A1 (en) | Power supply device, method and secure system | |
| US11824393B2 (en) | Power supplying device, method and secure system | |
| CN212784771U (en) | A power protection circuit and electronic equipment | |
| US12494248B2 (en) | Memory power control unit | |
| CN112115520A (en) | Internal power supply structure and method, safety chip and electronic card |