The present device relates to data security devices and methods.
There presently is a need to provide security for data and software. For example, in bank terminals, data are entered using a touchpad or derived by a card reader (e.g., a magnetic card reader). These data are used to make a secure transaction. Security is necessary for such a transaction and access to the data must be protected.
To ensure that the data are not tampered with, stolen, or otherwise accessed without authorization the data are commonly encrypted prior to transmission. However data or software could still be accessed prior to encryption, as by accessing the traces of an integrated circuit (IC) through which the unencryted data are first sent. The traces could be accessed by either direct contact to the trace, or electronic surveillance, such as decoding voltage on a lead by measuring electromagnetic changes (e.g., induced magnetic fields, capacitance, etc.).
In prior devices a three dimensional mesh has been used to enclose an IC and prevent tampering. For example U.S. Pat. No. 6,646,565 to Fu, et al. and entitled, “Point of Sale (POS) Terminal Security System,” discloses a device for security of electronic circuits in which an electrical connection is inserted between a first and a second circuit board. A tamper detection circuit is also used to detect circuit tampering. The entire device is wrapped in a mesh. Any tampering with the circuit boards or the mesh is sensed in a current flowing through a security layer in the circuit boards and mesh. This current disturbance signals a security system to scramble or erase sensitive data, such that the data will not be intercepted. Other similar devices include U.S. Pat. Nos. 4,593,384; 4,691,350; and 4,807,284.
U.S. Pat. No. 5,406,630, to Piosinka, et al., entitled, “Tamperproof Arrangement for an Integrated Circuit Device” discloses a tamper proof IC device. The package and lid include heavy metals to prevent both x-ray radiation and infrared detection of the functioning of the chip. This effectively provides an electrical shield of the workings of the IC
U.S. Pat. No. 6,396,400, to Epstein III, et al., entitled, “Security System and Enclosure to Protect Data Contained Therein,” discloses a security system for protecting a data storage device. The data storage device is enclosed in a first housing, which is mounted within a second housing by a number of support structures. A vacuum is created in an interstitial space between the first housing and the second housing. Breach of the second housing causes a pressure change that may be detected by a sensor.
In some security chips, a surface-level conducting trace layer is added which consists of one or more signal nets routed in such a way as to obscure the underlying circuitry. This top layer: 1. Visually hides the underlying circuit. An optical probe would not be able to image the circuit and from this image develop a means for accessing the circuit. 2. Prevents physical contact with the circuit; a physical probe would be prevented from contacting a conductive element in the underlying circuit and intercepting the signal that is present on that conductor. 3. Provides an electromagnetic shield. The conducting trace layer shields the underlying circuits from interference caused by electromagnetic signals. 4. Provides an electromagnetic masking signal. If a sensitive probe attempted to monitor an electromagnetic signal (including some indirect induced electromagnetic signal from the chip), the presence of an overlying source of electromagnetic signals would frustrate an attempt to intercept any underlying signal.
The shield may comprise an electrical shield component and a conductive component. The conductive component can be actively driven electrically in such a way that any disturbance to the component (e.g. drilling through the component, attempted modification to the conductive component, etc.) can be detected by a security circuit. The security circuit can then trigger a specific action, such as sounding an alarm, erasing data or software held by the circuit, etc.
An inherent feature of an active security trace is that when the voltage of the security trace layer changes it will induce a related change in any adjacent conductors through capacitance. The changing potential of the security trace will cause a current to flow in any adjacent trace via capacitive coupling. The current induced in an adjacent circuit is given by the equation I=C dv/dt, where “I” is a current induced, “C” is the value of capacitance between adjacent traces, and dv/dt is the rate of change of the driving voltage.
With reference to
A device that compensates for the unintended voltage coupling, thereby preventing any distortion of the signals in the underlying circuit would be useful.
An integrated circuit security apparatus with substantially parallel security traces is presented. In an exemplary embodiment, the security apparatus comprises a pattern generator, which generates a first signal that is coupled to a first security trace and a second signal that is coupled to a second security trace. The pattern generator produces a voltage change in the second security trace that is substantially complementary to the voltage change in the first security trace. The timing and amplitude of the second (complementary) signal is developed such that the voltage change induced by the first trace is balanced as closely as possible by a complementary voltage change induced by the second trace; the net induced voltage change is substantially nil. The arrangement of the first and second security traces are such that the second trace is arranged substantially parallel to the first trace and is as close as is practicable. The first signal as coupled to a first end of the first security trace is compared to the first signal as it occurs at a second end of the first security trace. The comparison is used to indicate whether or not there has been any tampering with the integrated circuit. The second signal may also be monitored for indications of tampering.
In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that process or mechanical changes may be made without departing from the scope of the present invention.
With reference to
In this embodiment, only two security traces are implemented. The geometric shapes used to create the trace pairs are designed in such a way that the two traces are as close as possible and oriented so that any significantly large signal adjacent to the traces (e.g. on a lower trace layer) has an equal capacitive coupling to both traces of the complementary pair. The result of this arrangement is a balance in the induced currents so that by using security signals that are substantially complementary in phase and amplitude, any induced currents are substantially canceled out.
It is possible to adjust an amplitude of the signal on the second trace, a phase relationship between the second and first signals, or both, in order to compensate for any circuit characteristics that affect capacitance, i.e., the dielectric constant (of the layers between the security traces 34, 36, and lower trace 44), the distance between the (virtual) unintended coupling capacitors 40, 42, and the size of the (virtual) unintended coupling capacitors' 42, 44 capacitive plates. A proper geometric arrangement can minimize any differences in coupling by maximizing the chances that both complementary security traces 34, 36, cross any underlying signals for an equal area. One such arrangement might be running the complementary shield traces in long parallel lines at a 45 degree angle to the underlying routing orientation, an alternative arrangement might be to vary the dimension of either of the conductive traces, which would allow for the localized control of the capacitive effect and thus the charge induced in the underlying circuit. This is one embodiment of the geometric arrangement that achieves the goal of balancing the induced currents.
One skilled in the art will recognize that the essential characteristic of using a security trace pairing arrangement is that the currents induced by the (virtual) unintentional coupling capacitors 40 and 42 to any lower trace 44 substantially cancel each other out. To this end, the range of voltages, trace sizes and trace geometries provide an unlimited number of combinations which can be utilized to achieve the desired cancellation. The skilled artisan will also recognize that lower trace 44 is representative, and that many such lower traces may be present in any given application. Therefore, the description contained herein should be viewed in an illustrative rather than restrictive sense.
This application claims priority from U.S. provisional application No. 60/678,446, filed May 6, 2005.
Number | Name | Date | Kind |
---|---|---|---|
3447120 | Rask et al. | May 1969 | A |
3772595 | De Wolf et al. | Nov 1973 | A |
4593384 | Kleijne | Jun 1986 | A |
4684931 | Parks | Aug 1987 | A |
4691350 | Kleijne et al. | Sep 1987 | A |
4807284 | Kleijne | Feb 1989 | A |
4833096 | Huang et al. | May 1989 | A |
5021848 | Chiu | Jun 1991 | A |
5262985 | Wada | Nov 1993 | A |
5406630 | Piosenka | Apr 1995 | A |
5420379 | Zank et al. | May 1995 | A |
5477068 | Ozawa | Dec 1995 | A |
5479368 | Keshtbod | Dec 1995 | A |
5618742 | Shone et al. | Apr 1997 | A |
5635862 | Abramson et al. | Jun 1997 | A |
5642061 | Gorney | Jun 1997 | A |
5675319 | Rivenberg et al. | Oct 1997 | A |
5687113 | Papadas et al. | Nov 1997 | A |
5760435 | Pan | Jun 1998 | A |
5776787 | Keshtbod | Jul 1998 | A |
5786612 | Otani et al. | Jul 1998 | A |
5789297 | Wang et al. | Aug 1998 | A |
5963806 | Sung et al. | Oct 1999 | A |
5972752 | Hong | Oct 1999 | A |
6043530 | Chang | Mar 2000 | A |
6074914 | Ogura | Jun 2000 | A |
6091101 | Wang | Jul 2000 | A |
6178113 | Gonzalez et al. | Jan 2001 | B1 |
6246970 | Silverbrook et al. | Jun 2001 | B1 |
6255689 | Lee | Jul 2001 | B1 |
6255691 | Hashimoto | Jul 2001 | B1 |
6323088 | Gonzalez et al. | Nov 2001 | B1 |
6327678 | Nagai | Dec 2001 | B1 |
6346822 | Nishikawa | Feb 2002 | B2 |
6396400 | Epstein, III et al. | May 2002 | B1 |
6479351 | Lojek et al. | Nov 2002 | B1 |
6496119 | Otterstedt et al. | Dec 2002 | B1 |
6531735 | Kamigaki et al. | Mar 2003 | B1 |
6646565 | Fu et al. | Nov 2003 | B1 |
6774790 | Houston | Aug 2004 | B1 |
6831325 | Lojek | Dec 2004 | B2 |
6879518 | Curry | Apr 2005 | B1 |
6919242 | Lojek | Jul 2005 | B2 |
7057235 | Lojek | Jun 2006 | B2 |
7098106 | Lojek | Aug 2006 | B2 |
7352203 | Ziomek | Apr 2008 | B1 |
7622944 | Ziomek | Nov 2009 | B2 |
20020167075 | Madrid | Nov 2002 | A1 |
20030013255 | Lojek et al. | Jan 2003 | A1 |
20030042970 | Humphrey | Mar 2003 | A1 |
20040032304 | Anthony et al. | Feb 2004 | A1 |
20040268136 | Mitsuishi | Dec 2004 | A1 |
20050223152 | Sugaware | Oct 2005 | A1 |
20070040256 | Tuyls et al. | Feb 2007 | A1 |
20070134875 | Lojek | Jun 2007 | A1 |
20080150574 | Ziomek | Jun 2008 | A1 |
Number | Date | Country |
---|---|---|
1292110 | Apr 2001 | CN |
1358059 | Jul 2002 | CN |
58-209136 | Dec 1983 | JP |
5-167020 | Jul 1993 | JP |
2001-166009 | Jun 2001 | JP |
2001-177064 | Jun 2001 | JP |
2001-244414 | Sep 2001 | JP |
WO-2005022635 | Mar 2005 | WO |
WO-2006121554 | Nov 2006 | WO |
WO-2006121554(A3) | Nov 2006 | WO |
WO-2008082989 | Jul 2008 | WO |
Number | Date | Country | |
---|---|---|---|
20060250239 A1 | Nov 2006 | US |
Number | Date | Country | |
---|---|---|---|
60678446 | May 2005 | US |