A security module can be used to provide security functions for protecting data. The security module can include a circuit board having electronic circuitry to perform the security functions. The security module can store secret information, such as a cryptographic key, that can be used for cryptographically protecting data (by encrypting data using the cryptographic key).
A security module may be subject to attack by an attacker to obtain secret information stored in the security module. The attack may involve physical penetration of or other physical tampering with the security module.
Some embodiments are described with respect to the following figures:
A security module (sometimes referred to as a hardware security module) can be used to perform cryptographic computations or other security functions on data, such as data of a financial transaction, electronic signature verification, and so forth. The cryptographic computation or other security function on data is performed to protect the data from unauthorized access. To perform its security functions, the security module can store secret information, which can be a cryptographic key or other type of secret information (e.g. password, etc.).
In some implementations, a security module may include a circuit board, which is removably connectable to a system, such as a computer system, a tablet, a game appliance, a television set-top box, and so forth. Data from the system can be provided to the security module, which can encrypt the data using a cryptographic key, for example. The encrypted data can then be provided to the system, which can communicate the encrypted data with another entity, such as over a network.
To defeat data protection offered by the security module, an attacker may attempt to physically penetrate or otherwise tamper with the security module in an effort to access the secret information that is stored in the security module. Once the secret information is derived by the attacker, the attacker can then gain access to data that is being protected by the security module. For example, if the attacker is able to gain access to a cryptographic key, then the attacker can decrypt encrypted data using the cryptographic key.
The security module can be provided with mechanisms to detect physical tampering or penetration of the security module. Penetration can be accomplished by drilling a hole through a cover of the security module. A probe can then be inserted through the hole to probe electronic circuitry inside the security module, such as a memory device or a signal trace in the security module. Alternatively, an attacker may tamper with the security module to disassemble the cover that is provided around the security module.
To detect physical tampering or penetration of a security module, a cover of the security module can be provided with an electrically conductive penetration sensor layer. Any attempt to drill through the cover may result in breakage of the penetration sensor layer, which can be detected.
The cost of manufacturing certain types of covers for security modules may be relatively high. Also, some security module covers may have reliability issues, and may not offer flexibility in how components of a security module can be arranged.
In accordance with some implementations, a security shield assembly (which has one or multiple covers) for a security module can be implemented as a printed circuit board (PCB) having multiple layers, where the multiple layers include electrically conductive penetration sensor layers, dielectric layers, and at least one signal layer. Implementing the security shield assembly as a PCB allows the security shield assembly to be made using PCB manufacturing techniques, which are relatively well established. As a result, the cost of manufacturing security modules can be reduced, and the reliability of the security shield assembly can be enhanced.
Conducting layers in a PCB can be made of relatively thin electrically conductive materials, such as copper or other types of conductive materials. The electrically conductive layers can be patterned (printed) onto dielectric layers. The dielectric layers can be laminated together to form the PCB. In some implementations, a PCB that is part of a security shield assembly can have relatively rigid dielectric layers. For example, a dielectric layer can be formed of a glass-reinforced epoxy laminate layer, such as an FR-4 layer. In other examples, other relatively rigid dielectric layers can be used. When the various dielectric layers are laminated together, the PCB becomes a relatively rigid structure that may be slightly bendable but is not capable of flexing by greater than some predefined angle.
Also, implementing a security shield assembly as a PCB allows for greater flexibility in how components of a security module can be arranged. For example, in addition to arranging electronic units on a main circuit board to be protected by the security shield assembly, one or multiple electronic units can also be arranged on the PCB that forms part of the security shield assembly. In some implementations, an electronic unit that can be mounted on the security shield assembly can perform certain predefined tasks, such as detection of physical tampering or penetration of the security shield assembly. In further examples, the electronics unit can also perform a security action in response to detected physical tampering or penetration, where the security action can include erasing (zeroizing) secret information stored in the security module, or locking access of secret information in the security module.
The security module 100 has a security shield assembly to protect the main circuit board 102. The security shield assembly prevents physical access of electronic circuitry in the security module 100. In the example of
The upper cover 108 has various layers, including an electrical ground layer 112, electrically conductive penetration sensor layers 114 and 116, and a signal layer 118. In other implementations, multiple signal layers may be present. Dielectric layers 120 are provided between successive ones of the layers 112, 114, 116, and 118. Additionally, the top cover member 108-1 has an outer layer 122, which can be an outer ground layer in some examples. A dielectric layer 124 is provided between the ground layer 112 and the outer layer 122. Another dielectric layer 126 is provided below the signal layer 118.
It is noted that the layers depicted in
The side cover member 108-2 similarly includes an outer layer 128, a ground layer 130, electrically conductive penetration sensor layers 132 and 134, and a signal layer 136. Dielectric layers are similarly provided between successive ones of the layers.
The lower cover 110 also includes an outer layer 138, a ground layer 140, electrically conductive penetration sensor layers 142 and 144, and dielectric layers between successive ones of the various layers. Although a signal layer is not depicted in the lower cover 110, it is noted that a signal layer can be provided in the lower cover 110 in other examples.
Each of the upper cover member 108-1, side cover member 108-2, and lower cover 110 can be implemented as a respective printed circuit board (PCB), which has the various layers depicted in
As additionally shown in
In accordance with some implementations, since the top cover member 108-1 is formed of a PCB, an electronic unit 150 can be mounted onto the inner surface 152 of the top cover member 108-1. Although not shown, vias can connect signal pins of the electronic unit 150 to signal traces in the signal layer 118. The electronic unit 150 can be a microcontroller or other type of integrated circuit (IC) chip. In some examples, the electronic unit 150 can be used for detecting penetration through the upper or lower cover 108 or 110. In further examples, the electronic unit 150 can additionally perform a security action in response to the detected tampering, where the security action can include erasing secret information stored by the security module 100, locking access to the security information (such that the secret information is inaccessible by a requestor), or other security action. The secret information can be stored in a storage (e.g. memory device) in the electronic unit 150, or alternatively, can be stored in one of the electronic units 104 on the main circuit board 102.
In some examples, the secret information can be a cryptographic key used to perform cryptographic computations (such as for encrypting data). In other examples, other types of secret information can be stored in the security module 100, such as passwords, and so forth.
One of the electronic units 104 on the main circuit board 102 can be a microprocessor, which is able to request a cryptographic key from the electronic unit 150. In response to such request, the electronic unit 150 can provide the cryptographic key to the microprocessor, which can then perform cryptographic computations on data (such as data received through the bracket 106 from an external system). The encrypted data can be provided by the microprocessor through the bracket 106 to the external system.
Although
In alternative implementations, instead of providing two discrete covers 108 and 110 as depicted in
As further depicted in
An attacker may attempt to disassemble the upper cover 108 from the lower cover 110 to gain access to the electronic circuitry in the security module 100. Disassembling the upper cover 108 from the lower cover 110 causes disengagement of the connector portion 164 from the connector receptacle 166, which can provide a separation indication that can be detected by the electronic unit 150. In response, the electronic unit 150 can take a security action, such as erasing or locking access to the secret information stored in the security module 100.
As further depicted in
In examples according to
In addition to the foregoing, the drill barriers 170 are provided to increase the depth that an attacker has to drill in a particular region where drilling is a vulnerability. Additionally, if the for drill barriers 170 are formed of a metallic material such as copper, a drill bit may not easily drill through the drill barriers. Also, copper tends to gall easily, which may cause a drill bit to bind and break. Larger drill bits that are less sensitive to galling are too large for drilling an attack hole through the upper and lower covers 108 and 110 without being detected by the penetration sensor layers 114, 116, 132, 134, 142, and 144.
A further protection mechanism that can be provided include ground rings 180, 182, 184, 186, 188, and 190 that can be provided around corresponding perimeters of penetration sensor layers 114, 116, 132, 134, 142, and 144. Thus, for example, the ground ring 180 is provided around the perimeter of the penetration sensor layer 114, the ground ring 182 is provided around the perimeter of the penetration sensor layer 116, and so forth.
A ground ring is electrically connected to ground and is provided around a perimeter of a penetration sensor layer to prevent probing of the respective penetration sensor layer. If a penetration sensor layer is successfully attacked, then the entire penetration detection system can be defeated and rendered useless.
In other examples, the penetration sensor layers 114 and 116 can have other patterns. In addition, more layers of penetration detection may be used than the two layers shown.
Also, various vias 206 are provided at various positions along the ground ring 180, to connect the ground ring 180 to the ground layer 112 (
In examples according to
The various pieces of the upper cover 108 are designed to snap together using the various tabs and grooves, as depicted. This allows an assembler to easily connect the pieces of the upper cover 108 together, especially with the inside and outside surfaces properly oriented.
In other implementations, instead of using the tabs and notches as depicted in
In addition, right-angle surface mount connectors 406 can be provided on the top cover member 108-1 to interconnect layers of the top cover member 108-1 to layers of the side cover member 108-2. The right-angle surface mount connector 406 has a portion that is perpendicular to another portion, to allow for connection between two members (108-1 and 108-2) that are generally perpendicular to each other. For example, as depicted in
In addition, as depicted in
Although
Note that various electrically conductive layers are not provided in the portion corresponding to a groove 605 located at the folding edge 604 of
In the foregoing description, numerous details are set forth to provide an understanding of the subject disclosed herein. However, implementations may be practiced without some or all of these details. Other implementations may include modifications and variations from the details discussed above. It is intended that the appended claims cover such modifications and variations.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2012/058422 | 10/2/2012 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2014/055064 | 4/10/2014 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
3990069 | Schuman | Nov 1976 | A |
4575610 | Gavin | Mar 1986 | A |
4807284 | Kleijne | Feb 1989 | A |
4811288 | Kleijne et al. | Mar 1989 | A |
5099485 | Bruckert et al. | Mar 1992 | A |
5159629 | Double et al. | Oct 1992 | A |
5309387 | Mori | May 1994 | A |
5353350 | Unsworth et al. | Oct 1994 | A |
5596718 | Boebert et al. | Jan 1997 | A |
5656931 | Lau et al. | Aug 1997 | A |
5790670 | Bramlett | Aug 1998 | A |
5858500 | MacPherson | Jan 1999 | A |
6396400 | Epstein, III et al. | May 2002 | B1 |
6828915 | Gottlieb | Dec 2004 | B2 |
7015823 | Gillen et al. | Mar 2006 | B1 |
7247791 | Kulpa | Jul 2007 | B2 |
7282635 | Utsunomiya et al. | Oct 2007 | B2 |
7549064 | Elbert et al. | Jun 2009 | B2 |
7743262 | Walmsley | Jun 2010 | B2 |
7945786 | Kumar et al. | May 2011 | B2 |
8245026 | Moore | Aug 2012 | B1 |
20020002683 | Benson et al. | Jan 2002 | A1 |
20020084090 | Farquhar et al. | Jul 2002 | A1 |
20060259788 | Elbert et al. | Nov 2006 | A1 |
20070018334 | Peytavy et al. | Jan 2007 | A1 |
20070038865 | Oggioni | Feb 2007 | A1 |
20070155302 | Dangler et al. | Jul 2007 | A1 |
20080253085 | Soffer | Oct 2008 | A1 |
20090086965 | Glendinning | Apr 2009 | A1 |
20090099025 | Uchaykin | Apr 2009 | A1 |
20100270923 | Froehlich et al. | Oct 2010 | A1 |
20120047374 | Klum et al. | Feb 2012 | A1 |
20120081859 | Christo et al. | Apr 2012 | A1 |
20120141753 | Hunrath | Jun 2012 | A1 |
20120184326 | Asterland | Jul 2012 | A1 |
20120254637 | Yasaki et al. | Oct 2012 | A1 |
Number | Date | Country |
---|---|---|
2005223299 | Aug 2005 | JP |
WO-9622541 | Jul 1996 | WO |
Entry |
---|
Hadley, Ted A., U.S. Appl. No. 13/052,755 entitled “Methods, Systems, and Apparatus to Prevent Memory Imprinting”, filed Mar. 21, 2011, 55 pages. |
Hadley, Ted A., U.S. Appl. No. 13/662,678 entitled “Managing a Fault Condition by a Security Module”, filed Oct. 29, 2012, 24 pages. |
International Search Report & Written Opinion received in PCT Application No. PCT/US2012/058422, Jul. 25, 2013, 11 pages. |
Sanapala. R. et al., “Effect of Lead-free Soldering on Key Material Properties of FR-4 Printed Circuit Board Laminates,” (Research Paper), International Conference on Electronic Materials and Packaging, Oct. 22-24, 2008, pp. 195-199. |
Number | Date | Country | |
---|---|---|---|
20150244374 A1 | Aug 2015 | US |