Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for securing firmware of a memory

A memory and memory module technology, applied in the field of firmware security, method and system, can solve the problems of difficulty, multi-cost, and impossibility of verification code confidentiality work

Inactive Publication Date: 2008-06-04
MEDIATEK INC
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the verification code is implemented on an integrated circuit (IC) in the form of hardware, then all users of this type of embedded system will use the same verification code, which will lead to the secrecy of the verification code. Work will be difficult or impossible
If there are some electric fuses in the IC to generate a personal desired and unique verification code, not only the electric fuses will increase the area of ​​the entire IC, but the electric fuses also need special manufacturing process to manufacture, both of which will add a lot of cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for securing firmware of a memory
  • Systems and methods for securing firmware of a memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] FIG. 1 is a functional block diagram of an embedded system and a host computer connected together through a standard interface. The host 10 can be a personal computer. The standard interface 11 can be an IDE bus or any kind of SPI interface. The embedded system 13 includes a microprocessor 12 and a storage module 14 . The storage module 14 includes a download module 18 , an embedded memory 16 , a memory check module 20 , and an erase module 22 . The embedded memory 16 can be a serial (serial) or parallel (parallel) flash memory (flash memory), which is used to store the firmware on which the microprocessor 12 operates. The embedded memory 16 can be placed in a multi-chip module (MCM) or in a system-on-chip (SOC) design. The download module 18 and the memory check module 20 work together as a guard to determine whether the memory data in the embedded memory 16 can be disclosed to the host 10 . When receiving an erase-trigger signal, the erase module 22 can erase the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for securing firmware in a memory is provided. Memory data in the memory is checked. If the memory data in the memory meets a criterion, a host is allowed to read and write the entire memory. If not, the host is prevented from reading the entire memory.

Description

technical field [0001] The invention relates to an embedded system, in particular to a method and a system capable of ensuring the security of firmware in a memory. Background technique [0002] A video game console, such as the PS2 TM or Xbox TM etc., are all embedded systems that store firmware in the embedded memory to control its operation. For example, the firmware may contain code to identify licensed and genuine game CD-ROMs. Such firmware should be kept confidential to prevent improper modification or update, and to avoid unauthorized use of pirated game CD-ROMs. [0003] Generally speaking, when there is no firmware in the embedded memory, in order to allow the embedded memory to be updated, the embedded system will provide an additional path built in, such as Integrated Drive Electronics (Integrated Drive) Electronics, IDE) or any kind of serial peripheral interface (SerialPeripheral Interface, SPI). Through such an extra path, the host (such as a personal com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/02
CPCG06F21/78G06F21/575G06F21/572G06F21/6209G06F21/62
Inventor 许绩群叶裕隆赵铭阳
Owner MEDIATEK INC