S802
S802 adopts 2-stage extremely simple pipeline, provides nearly 20 special protection technologies for various invasive and non-invasive physical attacks and enhances system security by the optional secure execution environment, which is applicable to areas that have very high requirements on system security, such as secure payment, smart card, etc.
S802 Features Industry Applications
S802
S802 adopts 2-stage extremely simple pipeline, provides nearly 20 special protection technologies for various invasive and non-invasive physical attacks and enhances system security by the optional secure execution environment, which is applicable to areas that have very high requirements on system security, such as secure payment, smart card, etc.
Features
Secure execution environment
Resist various software and hardware attacks,
enhance system security
Low-power cache
Reduce system memory access latency and
improve memory performance
Interrupt response acceleration technology
Enhance system real-time characteristics,
rapidly enter interrupt service routine
Average and peak power consumption control
Applicable to the specific application scenarios with stringent requirements on power consumption
Security level
EAL4 security certification;
BCTC security certification;
National secret level II certification;
FIPS security certification
Slide left and right to view the architecture
Industry Applications
Information Security
Architecture Features
Instruction set
XuanTie ISA
(32-bit/16-bit variable-length instruction system)
Pipeline
2-stage pipeline
General purpose register
16 32-bit GPR
Bus interface
Double bus (instruction bus data bus)
Memory protection
Optional 0~8 protection regions
Tightly coupled IP
Interrupt controller, timer
Multiplier
Optional slow or fast multiplier
Anti-attack engine
Available for effective protection against various invasive and non-invasive physical attacks
Slide left and right to view the architecture
basic
configurable
Technical Features
Secure execution environment
Resist various software and hardware attacks,
enhance system security
Low-power cache
Reduce system memory access latency and
improve memory performance
Interrupt response acceleration technology
Enhance system real-time characteristics,
rapidly enter interrupt service routine
Average and peak power consumption control
Applicable to the specific application scenarios with stringent requirements on power consumption
Security level
EAL4 security certification;
BCTC security certification;
National secret level II certification;
FIPS security certification