会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明公开
    • 하드웨어 기반의 보안 장치 및 이를 이용한 보안 방법
    • 基于硬件的安全设备和使用它的安全方法
    • KR1020160127508A
    • 2016-11-04
    • KR1020150059010
    • 2015-04-27
    • 한국과학기술원
    • 최양규박준영문동일
    • G06F21/81G06F21/70
    • H04L63/0209G06F21/74G06F21/75G09C1/00H01L23/57H01L29/78H04L9/3278H04L63/105H04L63/1408
    • 하드웨어기반의선택적보안장치및 이를이용한보안방법이개시된다. 본발명에따른보안장치는, 소스전극, 드레인전극및 적어도두 개의전극으로구성된게이트전극을구비하는트랜지스터및 게이트전극에인가되는전압의크기를조절함으로써, 1단계보안상태또는 2단계보안상태를선택적으로설정하는컨트롤러를포함한다. 본발명에의하면, 기존의하드웨어보안방식에서요구되는별도의칩을위한추가공간이필요없기때문에공간의용이성과경제성을지닌, 복구가능한하드웨어기반의보안이가능해진다. 또한, 복구가능한보안상태와복구불가능한보안상태를선택적으로적용함으로써, 하드웨어기반의강화된보안방식을구현할수 있다.
    • 公开了一种基于硬件的选择性安全设备及使用该设备的安全方法。 根据本发明的安全装置控制施加到晶体管和包括由源电极,漏电极和至少两个电极组成的栅电极的栅电极的电压的大小,使得一级安全状态或两级安全状态, 如图所示。 根据本发明,在传统的硬件安全方法中不需要额外的空间用于单独的芯片,因此可以实现具有空间和经济性的可恢复的基于硬件的安全性。 另外,可以通过选择性地应用可恢复的安全状态和不可恢复的安全状态来实现基于硬件的增强安全方案。
    • 5. 发明公开
    • 자기 메모리 셀의 어레이, 집적 회로 및 외부 자기장 노출여부 표시 방법
    • 用于磁记忆体的硬件安全装置
    • KR1020050084333A
    • 2005-08-26
    • KR1020057011072
    • 2003-12-15
    • 엔엑스피 비 브이
    • 렌센카스-미치엘에이치데니센아드리아누스제이엠람베르트니콜라스
    • H01L27/10
    • H01L23/57G11C11/16G11C11/1695H01L2924/0002H01L2924/00
    • The present invention provides a special structure of magnetic elements, e.g. MRAM elements (10, 11), as a security device (30) for IC's containing magnetic memory cells. The structure may comprise a combination of two or more associated magnetic elements (10, 11) with pre-set anti-parallel magnetization directions. By determining the polarisation directions of the magnetic elements, exposure to an external magnetic field can be detected. Inverse polarisation directions indicate a normal situation, aligned polarisation directions indicate that the MRAM-array has been exposed to an external field. In this way it can be detected whether it has been tried to erase or alter the data stored in the MRAM in an illegal way. The IC can regularly check the resistance of the security system during operation. Upon detection of a field exposure, the IC can erase all MRAM data, or can reset itself or block its functioning.
    • 本发明提供了一种磁性元件的特殊结构。 MRAM元件(10,11),作为用于包含磁存储器单元的IC的安全装置(30)。 该结构可以包括具有预设的反并联磁化方向的两个或更多个相关联的磁性元件(10,11)的组合。 通过确定磁性元件的极化方向,可以检测到暴露于外部磁场。 反偏振方向表示正常情况,对准偏振方向表示MRAM阵列暴露于外部场。 以这种方式,可以检测是否以非法方式擦除或更改存储在MRAM中的数据。 IC可以在运行期间定期检查安全系统的电阻。 在检测到场曝光时,IC可以擦除所有的MRAM数据,或者可以自己复位或阻止其功能。
    • 6. 发明公开
    • 스마트카드의 해킹검지회로
    • 使用计数器检测具有复杂结构的智能卡的检测电路
    • KR1020050011148A
    • 2005-01-29
    • KR1020030050122
    • 2003-07-22
    • 삼성전자주식회사
    • 김정현
    • G06K19/073
    • H01L23/57G06K19/073G06K19/07372H01L2924/0002H01L2924/00
    • PURPOSE: A hacking detecting circuit of a smart card having a complex structure using a counter is provided to remove an active shield layer and prevent a chip card from hacking by making the hacking detecting circuit using the active shield layer have the complex structure using the counter, and prevent the chip card from hacking more strictly by making the hacking detecting circuit pass all layers. CONSTITUTION: A shield layer counter(210) performs counting by using the shield layer as a part of a circuit. A normal layer counter(310) counts an output clock of a clock supplying circuit(100) by using the non-shield layer as the part of the circuit. A comparator(410) compares a count value of the shield layer counter with the count value of the normal layer counter, and judges the hacking of the chip card by determining sameness of the count values. A reset part resets the chip card in case that the hacking is detected by an output value of the comparator.
    • 目的:提供使用计数器的具有复杂结构的智能卡的黑客检测电路,以去除主动屏蔽层,并通过使用有源屏蔽层使黑客检测电路具有使用计数器的复杂结构来防止芯片卡入侵 并且通过使黑客检测电路通过所有层,防止芯片卡更严格地进行黑客攻击。 构成:屏蔽层计数器(210)通过使用屏蔽层作为电路的一部分进行计数。 正常层计数器(310)通过使用非屏蔽层作为电路的一部分来对时钟提供电路(100)的输出时钟进行计数。 比较器(410)将屏蔽层计数器的计数值与正常层计数器的计数值进行比较,并通过确定计数值的相同来判断芯片卡的黑客入侵。 在由比较器的输出值检测到黑客的情况下,复位部分复位芯片卡。
    • 8. 发明公开
    • 인증 장치, 인증 시스템 및 IC 카드
    • 方法,用于认证和IC卡的设备和系统
    • KR1020010091871A
    • 2001-10-23
    • KR1020000066112
    • 2000-11-08
    • 미쓰비시덴키 가부시키가이샤
    • 소노다겐이찌로
    • G06K19/00
    • G07F7/1008G06K19/07G06K19/073G06K19/07372G06Q20/341G07F7/082H01L23/544H01L23/57H01L2223/5444H01L2223/54473H01L2924/0002H01L2924/00
    • PURPOSE: An authentication method, device and system is provided to perform authentication without forming a non-volatile memory and without writing an authentication signal by measuring the frequency spectrum of electrical noise peculiar to a semiconductor for authentication and generating a code depending on the frequency spectrum as an authentication signal. CONSTITUTION: The device comprises an authentication signal extractor(2), a memory(3), a comparator(4), a display(5) and a controller(6). The authentication signal extraction part(2) measures the frequency spectrum of electrical noise peculiar to a semiconductor element, attachable or detachable, and generates a code depending on the frequency spectrum as an authentication signal. The memory(3) previously stores the authentication signal. When performing authentication, the comparator(4) compares the authentication signal, generated from the authentication signal extractor(2), with the registered authentication signal stored in the memory(3). The display(5) displays the compared result, namely a success or a failure of an authentication. The controller(6) controls overall operation of the device.
    • 目的:提供认证方法,设备和系统来执行认证而不形成非易失性存储器,并且通过测量半导体特有的电噪声的频谱来进行认证而不写入认证信号,并根据频谱生成码 作为认证信号。 构成:该装置包括认证信号提取器(2),存储器(3),比较器(4),显示器(5)和控制器(6)。 认证信号提取部分(2)测量可附接或可拆卸的半导体元件特有的电噪声的频谱,并根据频谱生成作为认证信号的码。 存储器(3)预先存储认证信号。 当执行认证时,比较器(4)将从认证信号提取器(2)生成的认证信号与存储在存储器(3)中的注册认证信号进行比较。 显示器(5)显示比较结果,即验证的成功或失败。 控制器(6)控制设备的整体操作。