Chip with program contents and external security function, and program download method
A program downloading and content technology, applied in the protection of internal/peripheral computer components, digital data protection, preventing unauthorized use of memory, etc., can solve the problems of leaking and being read by the outside, and achieve the effect of simple method and confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] Such as figure 1 As shown, in one embodiment, the chip with program content external security function of the present invention includes a processor 1 , a program memory 2 , a program download controller 3 and a gate 4 . Wherein, the processor 1 and the program download controller 3 are respectively connected to the program memory 2 through the connector 4, and the reset line connected outside the chip is connected to the program download controller 3 and an input terminal of an OR gate, and the program download controller 3 The reset control line of the processor is connected to the other input end of the aforementioned OR gate, and the output end of the OR gate is connected to the reset line of the processor, and the reset line is connected to the processor 1 . The program download controller 3 is connected with the equipment outside the chip through the serial port. The processor 1 is also connected to a bus, which is connected with other functional modules integrat...
Embodiment 2
[0075] In another embodiment of the present invention, when downloading the data package, all the data can be downloaded by area at first, and then the data in all areas after downloading can be verified, and the downloaded area with the wrong verification result can be re-checked. Do the download operation until all the data is downloaded successfully. For example, the program downloading and verification process from step 50 to step 90 of the first embodiment can also be realized by the method described below:
[0076] Step 200, encapsulating the data to be downloaded into a download data packet according to the protocol, sending it according to the area of the program memory 2, after sending the download data packet of the area, setting the waiting time and waiting for a response;
[0077] Step 210, judging whether the response is correct, if the response is correct within the specified time, then perform step 230, if there is no response after timeout, then accumulate th...
Embodiment 3
[0083] In yet another embodiment of the present invention, in the process of downloading program data package, can also adopt the mode of various downloading and checking combination, for example, can be divided into 5 areas in program memory 2, respectively use A, B, C, D, E said. When downloading and verifying, you can download areas A and B first, then verify areas A and B, then download areas C, D, and E, and then verify areas C, D, and E. It is also possible to download areas B and D first, verify area B, then download areas A, C, and E, and then verify areas A, C, D, and E. For a specific area, just follow the principle of downloading data first and then verifying data. The program download and verification process from step 50 to step 90 of the first embodiment can also be realized by the method described below:
[0084] Step 300, encapsulating the data to be downloaded into a download data packet according to the protocol, sending it according to the area of the pr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 