Safe JTAG connection identification system and identification method

An authentication method and security technology, applied in the field of secure JTAG connection authentication system, can solve problems such as cumbersome operation and achieve the effect of simple operation

Inactive Publication Date: 2008-04-30
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the disadvantage is that it is cumbersome to operate. Before each test, you need to enter the password to open the JTAG function, and then close the JTAG function after the test.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe JTAG connection identification system and identification method
  • Safe JTAG connection identification system and identification method
  • Safe JTAG connection identification system and identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] see figure 2 , which is a structural schematic diagram of a secure JTAG connection authentication system of the present invention. it is in figure 1 On the basis of the structure, two modules are added: an access module and an authentication module. Such as figure 2 As shown, the access module is placed outside the chip, and the authentication module is placed inside the chip. Both the access module and the authentication module store the same key. When the test interface is connected to the chip side, an authentication process will be carried out between the access module and the authentication module. After the authentication is passed, the authentication module will open the chip side. port, the computer can be like figure 1 Debug the chip transparently as shown.

[0033] see again image 3 , it is embodiment 1 of authentication method among the present invention, and it uses authentication system as above, and concrete steps are:

[0034] Step 1: The access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of safety control of a chip JTAG test port, in particular to a safe JTAG connection authentication system and an authentication method thereof. The connection authentication system is equipped between a JTAG test port and a chip to be tested and composed of an access module and an authentication module, which have interactive interfaces. The authentication method comprises (A) one side of the access module and the authentication module gives an authentication request, the other side generates a random number RN; (B) the access module calculates an authentication X' to SN by using a local private key K', and transmits X' to the authentication module; (C) the authentication module calculates an authentication X to RN by using a local private key K; (D) the authentication module compares X and X' and decides whether to open a TAP port at chip end; (E) the authentication module returns the authentication result to the access module. The invention can achieve JTAG port automatic identification of a legal access object and starting or closing JTAG function with simple manner, so as to achieve the purpose of preventing internal logic of the chip being stolen.

Description

technical field [0001] The invention relates to the technical field of security control of a chip JTAG test port, in particular to a safe JTAG connection authentication system and an authentication method thereof. Background technique [0002] The JTAG port is one of the important ways to test the operation status of the internal port logic function after the chip is packaged. It plays an important role in the chip development process and later inspection and maintenance. Usually, the JTAG connection method of the chip is as follows figure 1 As shown, the computer is directly connected to the JTAG interface on the chip side through the test interface. JTAG is mainly connected through the test access port (TAP), which contains 5 ports, namely test clock (TCK), test mode selection (TMS), test data input (TDI), test data output (TDO) and Test the reset signal (TRST). [0003] Since the logic inside the chip can be directly read from the external pins of the chip through the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
CPCH04L9/3271
Inventor 缪晖吕玲
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products