Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

semiconductor device

A technology of semiconductors and programs, applied in computer security devices, instruments, computing, etc., can solve the problems of weak resistance of microcomputers and power supply noise.

Active Publication Date: 2022-07-22
RENESAS ELECTRONICS CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the problem that arises is that microcomputers are less resistant to such attacks, making repetitive power supply noise, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • semiconductor device
  • semiconductor device
  • semiconductor device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0047]

[0048] Although a plurality of embodiments will be described below, the semiconductor devices to be described in the respective embodiments are respectively sold according to a new commercial sales model envisaged by the present inventors. Here, a description will first be made about a commercial sales model of a semiconductor device conceived by the present inventors.

[0049] figure 1 is a system diagram showing the configuration of the semiconductor device commercial sales model according to the embodiment. In the same drawing, reference numeral 100 denotes a semiconductor device commercial sales model. Although not specifically shown, the semiconductor device business sales model 100 includes a provider PRD, a user USR, and a third-party OTH that provides programs.

[0050] The provider PRD sells the microcomputer LSI to the user USR. In the microcomputer LSI, a plurality of circuit blocks are formed in a single semiconductor chip by a known semiconductor ma...

no. 2 example

[0225] Figure 12 is a layout diagram showing the layout of data stored in the flash memory FRM according to the second embodiment.

[0226] The flash memory FRM according to the second embodiment is divided into a plurality of regions. In the area where the flash memory FRM is configured, Figure 12 The non-secure program area, the secure program area, and the protected information area are shown in . exist Figure 12 , the non-secure program area is denoted by reference numeral 1200 , the secure program area is denoted by reference numeral 1201 , and the protected information area is denoted by reference numeral 1202 .

[0227] In the second embodiment, the safety program whose safety should be ensured is stored in the safety program area 1201 , and the non-safety program is stored in the non-safety program area 1200 . The information of the protected safety program area 1201 is stored in the protected information area 1202 .

[0228] In the new semiconductor commercial...

no. 3 example

[0257] Figure 15 is a block diagram showing the configuration of the microcomputer according to the third embodiment. because Figure 15 The configuration of the microcomputer LSI shown is similar to figure 2 The microcomputers are shown, and the differences between them will be mainly described. In addition, in addition to the microcomputer LSI, such as figure 2 as in, in Figure 15 Even the server P-SV and the network NTW are shown.

[0258] In the new semiconductor commercial sales model, such as figure 1 As shown, the provider PRD pre-writes the security program such as RTOS into the flash memory FRM. A microcomputer LSI provided with a flash memory FRM in which an RTOS is written, a microprocessor CPU, and the like is sold from the provider PRD. The user USR writes the user program U-AP or the like generated by the user USR into the flash memory FRM in the purchased microcomputer LSI.

[0259] In this case, such as when the user USR performs version upgrade or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a semiconductor device capable of arbitrarily operating a microprocessor while protecting a security program. The semiconductor device includes: a memory having a first program area storing an arbitrary program and a second program area storing a safety program; a microprocessor that outputs an address specifying an instruction in the program; and a memory protection unit based on a slave microprocessor. output address to control access to the memory. The memory protection unit allows access to the memory when the address output from the microprocessor by executing the program in the first program area specifies the branch permission area in the second program area. When the address specifies a branch prohibition area, the memory protection unit prohibits access to the memory.

Description

[0001] CROSS-REFERENCE TO RELATED APPLICATIONS [0002] The entire contents of Japanese Patent Application No. 2015-182140 filed on September 15, 2015, including the specification, drawings and abstract, are incorporated herein by reference. technical field [0003] The present invention relates generally to a semiconductor device, and more particularly, to a semiconductor device having a microprocessor and electrically rewritable non-volatile memory both built within a single semiconductor chip. Background technique [0004] A semiconductor device including a microprocessor (hereinafter referred to as a central processing unit) and an electrically rewritable nonvolatile memory, both built in a single semiconductor chip, is known as a microprocessor, for example. Such microprocessors are often used even in product areas where safety is required. When a microcomputer is used in a product field requiring security, an attack against security is performed in principle from the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/74G06F21/78
CPCG06F21/577G06F21/74G06F21/78G06F2221/034G06F21/52G06F21/55G06F21/57G06F12/1408G06F12/1441G06F2212/1052G06F2212/402
Inventor 石原国泰植木浩
Owner RENESAS ELECTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products