Unlock instant, AI-driven research and patent intelligence for your innovation.

Chip with program contents and external security function, and program download method

A program downloading and content technology, applied in the protection of internal/peripheral computer components, digital data protection, preventing unauthorized use of memory, etc., can solve the problems of leaking and being read by the outside, and achieve the effect of simple method and confidentiality

Active Publication Date: 2010-05-19
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the defect that the existing processor chip needs a special downloader when downloading the program, and the program content in the chip can be read externally, which is easy to cause leaks, so as to provide an external security function for the program content. the chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip with program contents and external security function, and program download method
  • Chip with program contents and external security function, and program download method
  • Chip with program contents and external security function, and program download method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Such as figure 1 As shown, in one embodiment, the chip with program content external security function of the present invention includes a processor 1 , a program memory 2 , a program download controller 3 and a gate 4 . Wherein, the processor 1 and the program download controller 3 are respectively connected to the program memory 2 through the connector 4, and the reset line connected outside the chip is connected to the program download controller 3 and an input terminal of an OR gate, and the program download controller 3 The reset control line of the processor is connected to the other input end of the aforementioned OR gate, and the output end of the OR gate is connected to the reset line of the processor, and the reset line is connected to the processor 1 . The program download controller 3 is connected with the equipment outside the chip through the serial port. The processor 1 is also connected to a bus, which is connected with other functional modules integrat...

Embodiment 2

[0075] In another embodiment of the present invention, when downloading the data package, all the data can be downloaded by area at first, and then the data in all areas after downloading can be verified, and the downloaded area with the wrong verification result can be re-checked. Do the download operation until all the data is downloaded successfully. For example, the program downloading and verification process from step 50 to step 90 of the first embodiment can also be realized by the method described below:

[0076] Step 200, encapsulating the data to be downloaded into a download data packet according to the protocol, sending it according to the area of ​​the program memory 2, after sending the download data packet of the area, setting the waiting time and waiting for a response;

[0077] Step 210, judging whether the response is correct, if the response is correct within the specified time, then perform step 230, if there is no response after timeout, then accumulate th...

Embodiment 3

[0083] In yet another embodiment of the present invention, in the process of downloading program data package, can also adopt the mode of various downloading and checking combination, for example, can be divided into 5 areas in program memory 2, respectively use A, B, C, D, E said. When downloading and verifying, you can download areas A and B first, then verify areas A and B, then download areas C, D, and E, and then verify areas C, D, and E. It is also possible to download areas B and D first, verify area B, then download areas A, C, and E, and then verify areas A, C, D, and E. For a specific area, just follow the principle of downloading data first and then verifying data. The program download and verification process from step 50 to step 90 of the first embodiment can also be realized by the method described below:

[0084] Step 300, encapsulating the data to be downloaded into a download data packet according to the protocol, sending it according to the area of ​​the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a chip with a program confidentiality function, comprising a processor and a program memory and also comprising a program download controller, gates and an 'OR gate', and the program download controller adopts a non-reversible means for verification, wherein, the processor and the program download controller are respectively connected on the program memory through the gates; a reset line which is connected to the outside of the chip is connected with the program download controller and an input end of the 'OR gate'; a processor reset control line of the program downloadcontroller is connected with the other input end of the 'OR gate'; an output end of the 'OR gate' is connected on a rest line of the processor; the program download controller is connected with a device which is arranged outside the chip through an interface device; the processor is also connected on a bus inside the chip. The invention adopts non-reversible coding verification method, and no logic method is left over when a program is read out on the outside of the chip, thereby program data confidentiality is realized fundamentally.

Description

technical field [0001] The invention relates to a chip design method, in particular to a chip with the function of keeping program content external and a corresponding program downloading method. Background technique [0002] At present, the practice of integrating program memory, memory and other modules in the processor chip is very common in the field of single-chip microcomputers and embedded systems. But at present, most of such chips need to use a special downloader when downloading a program, which is inconvenient to use. In addition, more importantly, in order to facilitate the verification and application of these chips, there is no external program memory design. The downloader or other devices can read the contents of the program memory through specific logic, which makes it difficult to meet certain needs. Applications where the content is kept secret, such as wireless sensor networks for military and other applications. [0003] Wireless sensor network is a se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F12/14G06F21/60G06F21/76
Inventor 黄希崔莉
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI