The critical information such as keys/certificates are placed in a safe state and managed by the security OS.
As a black box, security OS only provides service, while the attacker cannot obtain its code or working principle.
One-stop MCU/SoC Technology Platform
The MCU/SoC can be customized according to the customer's requirements (including CPU instruction set customization) and controlled independently based on the CPU core.
Embedded eSE Security Unit Technology
As a single-chip embedded module, the security subsystem is crucial to ensure chip devices' security and relevant data information security.
Trusted CPU + Security CPU
The critical information such as keys/certificates are placed in a safe state and managed by the security OS.
As a black box, security OS only provides service, while the attacker cannot obtain its code or working principle.
Trusted CPU-based SoC
Trusted CPU
Adopt CK803S core
Introduce trusted implementation technology
Adopt CK802 core
19 customizable security mechanisms
Five Core Technologies of Security Encryption
20mA: The basic protocol stack running on CPU 36MHz clock
100mA: The protocol stack full speed running on CPU 144MHz clock
2.5μA: The chip under to-wake-up status, supporting external trigger, timing, and other wake-up sources
1μA: the chip under long sleep status, reducing energy consumption, while regular wakeup is supported
Domestic, independent C-SKY V2 32 / 16-bit mixed RISC CPU
RISC-V instruction set architecture RISC CPU
Custom instruction set RISC/CISC CPU
Universal processor DSP instruction extension
DSP, ASIP, hardware accelerator
Customized ESD technology and optimization: > 8KV HBM ESD
Customized EMC technology and optimization
Spread spectrum OSC and PLL technology
Real time monitoring for chip’s junction temperature and voltage drop
Adjust the chip run mode to ensure stable running.
Fault detection, recovery, isolation