Single MCU Solution for Safety-Related Applications Using TrustZone

2023-08-24 RENESAS Blogs

TrustZone® (TZ) technology often gets associated with safety-related applications, like protecting cryptographic keys or hardware resources from unauthorized exposure. By reducing the attack surface and strictly enforcing the access policy, it is possible to create an on-chip environment safeguarding the misuse of such valuable resources.


Generalizing from the security-focused use case, what TZ really provides is hardware isolation of resources within a processing context, so generally applicable to other environments, where IEC 60730 normative requirements must be fulfilled. Those norms define several classes or categories of appliances and strive for the safe operation of automatic electrical controls within a household. The classification in categories A, B, or C is tied to the type of appliance and the threats it might pose to human beings during operation. Class A products do not provide potentially harmful features or functions. Class B appliances need to implement control functions that can prevent an unsafe operation of the controlled equipment. A washing machine is a good example, with sensors to stop operation as soon as the appliance temperature exceeds the safe operational limit, or a door lock preventing an operator from accessing the loading drum during an ongoing washing cycle. The related software includes code meant to prevent hazards if a hardware fault occurs.


Class C is more demanding since the control functions must prevent especially dangerous and harmful hazards like explosions. A typical example of such a system is an automatic burner control. Such type of software requires more strict controls, as deep and thorough diagnostics are necessary since a fault in the safety critical software routine will result in a hazard. This is because a failure in one function is not assumed to be mitigated by intervention of another software safety routine, or by redundant hardware. Several annexes to the main norm define the software evaluation requirements, down to the electronics controls. Broadly speaking, the norms discuss the embedded components (i.e., system implementation aspects) that must be tested to comply with Class B and Class C. At the same time, the norms list a few measures required to ensure safe and reliable operation.


Within the RA6 and RA4 MCU family, Arm® Cortex®-M33 CPU-based devices provide support for Arm TrustZone-M. TrustZone technology defines a secure or non-secure state within the CPU context, isolating user threads and interrupts from executing while in the non-secure state from those executing in the secure state. A secure program (located in an executable memory region marked as secure) can access both secure and non-secure data and executes only while the CPU is in a secure state. A non-secure program (in non-secure executable memory) can access non-secure data only and executes only while the CPU is in a non-secure state; any violating transaction is blocked, and a secure fault exception (interrupt) is issued. The non-secure environment can interact with the secure portion by using a controlled, user-defined, non-secure callable functional interface. The RA hardware supports a convenient granularity for defining the TZ memory section boundaries, to optimize their allocation.


At the system level, the asset isolation policy is similarly applied to on-chip memories, bus initiators like direct memory access (DMA) controllers, peripherals, and I/O ports. All bus initiators feature security attributes that allow allocation of their operation within one of the two domains, identifying each generated transaction as either secure or non-secure. Illegal transactions generate system exceptions for appropriate user-configurable error handling. To ensure system integrity, all transfers violating the policy are either rejected upfront or stopped as soon as the violation is detected.


On the receiver side, TZ filters are implemented to monitor all bus transactions, allow the legitimate ones to proceed, and block the non-allowed ones, according to the user-defined system configuration. In addition, every peripheral functional interface (memory mapped registers) has dedicated security attributes for either all its registers, for each channel (applicable to multi-channel instances), or at the individual bit level (for shared system level settings, or general-purpose I/O modules). Complementary hardware features like application watchdogs, independent watchdogs, and MPUs, assist the developer in enhancing system resilience and supporting the safety-relevant Class C software in monitoring the operation of the non-safety-related application portion. This is mandatory to react appropriately and ensure the system is always in a safe and controlled state of operation.


As for the configuration of the application and the drivers, RENESAS has developed a clever and simple-to-use tool, integrated within the e2 studio development environment, to guide the user in creating a secure and non-secure project in a few easy steps. Under the hood, the tool takes care of generating all appropriate compiler primitives and macros necessary to handle the configured non-secure callable interfaces and function stubs. It also assists in allocating the memory layout automatically in a size-optimized way and generating the secure and non-secure sections for later seamless programming of the application image.


Noticeably, TrustZone as a tool by itself does not comply with the Class C standard requirements. Just using TrustZone does not mean creating or being compliant with the requirements of a software system for Class A and C; the final software evaluation and the testing according to abnormal operation (operation under fault conditions of hardware) is not substituted by simply using TrustZone. It is still the manufacturer’s responsibility to use the TrustZone and MCU environment correctly and completely to fulfill the requirements of the standard.


However, TrustZone as a tool and its implementation on the RA family of microcontrollers can support the software manufacturer in creating a software system of software Class A and C within one single microcontroller. This statement has been confirmed by VDE, and the respective test report (about the result of a singular investigation carried out on the product submitted, of which a sample was tested) found the accordance with the thereafter listed [Standards] or clauses from the relevant [Standards], see footnote.


Renesas has created a technical note that details how the RA MCU features can support the creation of a Class C application. Developers can contact Renesas to get more information on this solution advancement and get the full test report information.


[Standards] IEC 60335-1:2010, /AMD1:2013, /AMD2:2015 Annex R; EN 60335-1:2012+AC+A11+A13+A1+A2+A14:2019; EN 60335-1:2012/A15:2021 Annex R; IEC 60730-1:2013, /AMD1:2015, /AMD2:2020 Annex H; EN 60730-1:2016+A1:2019, EN 60730-1:2016/A2:2022 Annex H

技术资料,数据手册,3D模型库,原理图,PCB封装文件,选型指南来源平台:世强硬创平台www.sekorm.com
现货商城,价格查询,交期查询,订货,现货采购,在线购买,样品申请渠道:世强硬创平台电子商城www.sekorm.com/supply/
概念,方案,设计,选型,BOM优化,FAE技术支持,样品,加工定制,测试,量产供应服务提供:世强硬创平台www.sekorm.com
集成电路,电子元件,电子材料,电气自动化,电机,仪器全品类供应:世强硬创平台www.sekorm.com
  • +1 赞 0
  • 收藏
  • 评论 0

本文由翊翊所思转载自RENESAS Blogs,原文标题为:Single MCU Solution for Safety-Related Applications Using TrustZone,本站所有转载文章系出于传递更多信息之目的,且明确注明来源,不希望被转载的媒体或个人可与我们联系,我们将立即进行删除处理。

相关研发服务和供应服务

评论

   |   

提交评论

全部评论(0

暂无评论

相关推荐

【应用】瑞萨的RZ/G1M嵌入式多核处理器(MPU)帮助相机系统实现了实时图像处理,最大总线频率高达800MHz

瑞萨支持网络摄像机的主要设备,从高分辨率和高清CMOS图像传感器,到具有图像处理功能和显示功能的MPU,到用于摄像机电机控制的MCU。瑞萨还通过提供更智能的图像识别和身份验证应用软件,帮助用户提高产品价值。瑞萨的RZ/G系列MPU扩展了RZ/A MPU的功能,通过摄像头输入、3D图形加速器、全高清视频编解码器和GbE等功能,为图形,多流视频和嵌入式视觉提供高端性能。

2019-04-30 -  应用方案

【应用】基于瑞萨MCU、MPU的交流伺服系统微处理/控制器解决方案

交流伺服系统(AC Servo System)是一种伺服系统,根据Servo一词它是指能跟随外部指令进行人们所期望运动的系统,运动要素可以包括位置、力矩以及速度等。交流伺服系统包括基于异步电动机的伺服系统以及基于同步电动机的伺服系统,具有稳定性好、快速快、精度高等特点。

2018-07-24 -  应用方案

【应用】具备3D图形引擎/视频编解码器的瑞萨高性能MPU,助力智能停车场控制系统设计

对于现代智能停车场管理系统,在系统设计中,本文推荐Renesas提供的MPU解决方案——RZ/G1N和RZ/G1M高端MPU,采用1.5 GHz双核CPU,具备3D图形和视频编解码器引擎,支持全高清视频编码和解码,具备极高的数据处理性能。是智能停车场管理系统图像处理的理想选择。

2018-08-28 -  应用方案

【经验】瑞萨RA系列MCU使用e2 studio的断点调试方法和注意事项

瑞萨RA系列MCU可以使用e2 studio等开发环境进行调试和下载程序,在使用e2 studio时我们经常会遇到一些异常现象,如没有办法下断点进行调试,无法debug观察寄存器状态等,本文将介绍一下e2 studio常见的断点调试方法和注意事项。

2022-02-23 -  设计经验

【经验】解析瑞萨RA家族MCU的主要区别及命名规则

​目前瑞萨电子(Renesas)已经发布的RA产品家族MCU主要包括四个系列即RA2系列、RA4系列和RA6系列,以及计划发布的RA8系列。有很多客户不了解RA家族处理器的主要区别和命名规则,本文讲详细讲解。

2022-04-20 -  设计经验

“嵌入式AI MPU ” RZ/V介绍

型号- RZ/V2L,RZ/V2M,RZ/V2XX,RZ/V2MA,RZ/V SERIES,RZ/V2XXX,RZ/V3X

2023/9/18  - RENESAS  - 商品及供应商介绍 查看更多版本

【经验】瑞萨RA系列MCU低功耗唤醒功能测试

瑞萨RA系列MCU低功耗一共有三种模式,本次测试选择时钟为32.76kHZ,使用电容触摸按键唤醒,datasheet上描述芯片常温下功耗为0.55uA,用开发板实测功耗为60uA,经过检测,功耗主要来源于电容电阻,开发板中有一颗电阻功耗在30uA,并具体分析。

2021-08-25 -  设计经验

【经验】解析瑞萨MPU RZ/T1 SPI总线通信功能配置方法

当我们使用瑞萨(Renesas)MPU RZ/T1做项目开发时,基本都会用到SPI总线通信的功能,SPI总线通信速率较快很适合在单片机板级之间进行数据交互,本文将介绍使用瑞萨开发环境配置生成RZ/T1 SPI总线驱动程序的方法。

2022-05-02 -  设计经验

RZ/G MPU G2L、LC、UL组

型号- RZ/G3YYY,RZ/G2L,RZ/G2M,RZ/G2LC,RZ/G2UL,RZ/G1M,RZ/G2N,RZ/G1N,RZ/G,RZ/G1C,RZ/G2E,RZ/G1E,RZ/G2H,RZ/G1H,RZ/G3YY,RZ/G3XX,RZ/G3ZZ,RZ/G4X,RZ/G3X,RZ/G3Y,RZ/G4XX,RZ/G3Z

SEPTEMBER 2023  - RENESAS  - 商品及供应商介绍

【经验】瑞萨RA系列MCU时钟系统解析

本文以瑞萨MCU RA6T2为例,如下XTAL是外接的主时钟,频率为8到24M范围内任意可选。连接到单片机的XTAL和EXTAL引脚,HOCO:是片上高速振荡器,他不可以随意设置,比如RA6T2,他的HOCO为16,18,20M三选一。

2023-03-26 -  设计经验

【经验】瑞萨MPU RZ/T1使用SSC生成EtherCAT CiA402协议栈方法

瑞萨MPU RZ/T1支持EtherCAT网络设计,如何使用协议栈工具生成相对应的EtherCAT从机栈代码呢,本文主要就Beckhoff工具生成EtherCAT CiA402协议栈方法做相关介绍。

2021-12-26 -  设计经验

RZ/G MPU G2H,M,N,N组

型号- RZ/G3YYY,RZ/G2L,RZ/G2M,RZ/G2LC,RZ/G2UL,RZ/G1M,RZ/G2N,RZ/G1N,RZ/G1C,RZ/G2E,RZ/G1E,RZ/G2H,RZ/G1H,RZ/G3XX,RZ/G3YY,RZ/G3ZZ,RZ/G4X,RZ/G3X,RZ/G3Y,RZ/G4XX,RZ/G3Z

SEPTEMBER 2023  - RENESAS  - 商品及供应商介绍

【经验】瑞萨RZ/T2M系列MPU使用IAR开发环境时的调试方法和注意事项

瑞萨RZ/T2M系列MPU可以使用IAR开发环境进行开发,当我们使用IAR开发环境加载一些瑞萨RZ/T2M相关例程项目时,总是会遇到一些编译报错问题,烧写异常问题,此文主要介绍使用IAR开发环境连接调试RZ/T2M系列MPU的方法和一些注意事项。

2023-03-31 -  设计经验

【经验】瑞萨MPU RZ/T1使用code generator生成SCI的初始代码方法

工程师初次使用瑞萨(Renesas)RZ/T1系列MPU时,可能不知道SCI该如何配置波特率,中断入口,中断标志位等。本文将介绍RZ/T1系列MPU利用code generator生产SCI的配置方法。

2022-04-22 -  设计经验

RZ/Five RISC-V核通用MPU

型号- RZ/FIVE,RZ/FIVE2

SEPTEMBER 2023  - RENESAS  - 商品及供应商介绍
展开更多

电子商城

查看更多

品牌:RENESAS

品类:芯片

价格:¥54.1044

现货: 0

品牌:瑞纳捷

品类:高性能防复制加密芯片

价格:¥0.7000

现货: 1,234,500

品牌:瑞纳捷

品类:MCU

价格:¥0.5500

现货: 740,897

品牌:武汉芯源

品类:通用MCU

价格:¥8.4750

现货: 300,010

品牌:武汉芯源

品类:通用MCU

价格:¥7.0625

现货: 300,000

品牌:武汉芯源

品类:通用MCU

价格:¥7.6275

现货: 300,000

品牌:武汉芯源

品类:通用MCU

价格:¥4.8025

现货: 300,000

品牌:武汉芯源

品类:通用MCU

价格:¥7.6275

现货: 300,000

品牌:武汉芯源

品类:通用MCU

价格:¥4.8025

现货: 300,000

品牌:武汉芯源

品类:通用MCU

价格:¥7.0625

现货: 300,000

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

现货市场

查看更多

品牌:RENESAS

品类:MCU

价格:¥31.8593

现货:50

品牌:RENESAS

品类:16-BIT MCU

价格:¥5.5190

现货:910,635

品牌:RENESAS

品类:MCU

价格:¥5.1500

现货:200,000

品牌:RENESAS

品类:MCU

价格:¥5.8041

现货:86,925

品牌:RENESAS

品类:32-BIT GENERAL MCU

价格:¥7.3800

现货:76,715

品牌:RENESAS

品类:32-BIT GENERAL MCU

价格:¥15.3000

现货:75,000

品牌:RENESAS

品类:32-BIT GENERAL MCU

价格:¥257.6400

现货:58,799

品牌:RENESAS

品类:芯片

价格:¥25.3732

现货:42,346

品牌:RENESAS

品类:MCU

价格:¥19.4999

现货:39,498

品牌:RENESAS

品类:MCU

价格:¥39.8484

现货:38,160

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

服务

查看更多

TFT LCD液晶显示屏/模组定制

可定制显示屏的尺寸0.96”~15.6”,分辨率80*160~3840*2160,TN/IPS视角,支持RGB、MCU、SPI、MIPI、LVDS、HDMI接口,配套定制玻璃、背光、FPCA/PCBA。

最小起订量: 1000 提交需求>

MCU烧录/Flash烧录/CPLD烧录

可烧录IC封装SOP/MSOP/SSOP/TSOP/TSSOP/PLCC/QFP/QFN/MLP/MLF/BGA/CSP/SOT/DFN;IC包装Tray/Tube/Tape;IC厂商不限,交期1-3天。支持IC测试(FT/SLT),管装、托盘装、卷带装包装转换,IC打印标记加工。

最小起订量: 1pcs 提交需求>

查看更多

授权代理品牌:接插件及结构件

查看更多

授权代理品牌:部件、组件及配件

查看更多

授权代理品牌:电源及模块

查看更多

授权代理品牌:电子材料

查看更多

授权代理品牌:仪器仪表及测试配组件

查看更多

授权代理品牌:电工工具及材料

查看更多

授权代理品牌:机械电子元件

查看更多

授权代理品牌:加工与定制

世强和原厂的技术专家将在一个工作日内解答,帮助您快速完成研发及采购。
我要提问

954668/400-830-1766(工作日 9:00-18:00)

service@sekorm.com

研发客服
商务客服
服务热线

联系我们

954668/400-830-1766(工作日 9:00-18:00)

service@sekorm.com

投诉与建议

E-mail:claim@sekorm.com

商务合作

E-mail:contact@sekorm.com

收藏
收藏当前页面