Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety JTAG module and method for protecting safety of information inside chip

A technology for internal information and protection chips, applied in computer security devices, internal/peripheral computer component protection, electronic digital data processing, etc. JTAG port protection measures failure and other problems, to achieve the effect of personalized management, avoid the risk of failure, and ensure security

Inactive Publication Date: 2012-11-28
SHENZHEN STATE MICRO TECH CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology has considered the potential safety hazards of SOC chip debugging, but the overall safety of the test is insufficient.
[0005] For example, the Chinese patent applications with application numbers 200410003197 and 200610050898 respectively provide a technical solution to solve the above-mentioned potential safety hazard caused by the JTAG port from the perspective of chip debugging, but there are the following defects: the technical solutions provided by these two patent applications It is suitable for one-time mass programming, and it is not convenient for personalized distribution and multi-party development; the personalized distribution here means that in the case of JTAG protection, user A can only access the content that user A can access through the JTAG port, but cannot access The content that user B can access; In addition, these two patent applications only provide two options: off or on, and do not use the tracking and analysis of chip failures after productization
The user may even open the closed JTAG port through the full scan chain test technology, thereby invalidating the JTAG port protection measures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety JTAG module and method for protecting safety of information inside chip
  • Safety JTAG module and method for protecting safety of information inside chip
  • Safety JTAG module and method for protecting safety of information inside chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0046] figure 1 It is a schematic diagram of the internal structure of the system chip disclosed in the present invention. A system on chip (System on Chip, SOC) 2 includes: a security JTAG (Join Test Action Group) circuit 21 , a processor JTAG circuit 22 , a full scan chain test circuit 23 and a memory test circuit 24 . Processor JTAG circuit 22, full scan chain test circuit 23 and memory test circuit 24 are objects (abbreviated as protection objects) that system chip 2 is protected by security JTAG circuit 21, only through the security permission of security JTAG circuit 21, the user can pass through JTAG port 1 accessing or starting the protection object, and realizing the test or debugging of the system chip 2 . Therefore, the present invention focuses on describing how the security JTAG circuit 21 implements security control on the processor JTAG...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety JTAG circuit and a method for protecting the security of information inside a chip. The safety JTAG circuit connected between a JTAG port and a protected object comprises a nonvolatile medium, a loading circuit, a security attribute control register, a TAP controller, a first selector, a second selector, a switch, a password authentication circuit and a logic processing circuit. The TAP controller and the two selectors are connected between the JTAG port and the protected object. The switch is switched by the control of a timer. The password authentication circuit is used for authenticating whether a clear-text password input by a user is accordant with a fuzzification password or not. The logic processing circuit is used for logically processing an authentication result output by the password authentication circuit and an indication signal output by the security attribute control register and outputting an enable signal to the two selectors so as to control whether the JTAG port is allowed to be connected with the protected object inside the chip through the TAP controller or not. The invention ensures the security and the convenience of an SOC chip in testing and debugging processes, thereby protecting the security of data inside the chip.

Description

technical field [0001] The present invention relates to the security control technology of SOC chip JTAG port, especially relate to a kind of security JTAG circuit that carries out security control to processor JTAG circuit, memory test circuit and full scan chain test circuit inside SOC chip, and application of the security JTAG Circuits to realize the method of protecting the information security inside the chip. Background technique [0002] Testing and debugging is an important link in the design and production of SOC (System-on-Chip) chips. The test is used to ensure that the SOC chip can work normally, and the purpose of debugging is mainly to facilitate the application development or fault tracking analysis of the chip. [0003] For the debugging of the integrated processor (central processing unit, microprocessor) of the SOC chip, the JTAG (Join Test Action Group) port is mainly used. The user can control the processor to execute the instruction expected by the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/71
Inventor 王良清张鹏
Owner SHENZHEN STATE MICRO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products