Microcontroller object code protection method and system

A technology of object code and micro-controller, which is applied in the field of micro-controller encryption, can solve the problems of increasing manufacturing cost and not being suitable for widespread promotion and use, and achieve the effects of reducing manufacturing and using costs, ensuring storage security, and a high degree of confidentiality

Inactive Publication Date: 2017-09-19
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the first step, the IP supplier first writes its own code into microcontroller A, and then delivers microcontroller A to the customer; in the second step, the customer writes its own code into microcontroller B, and then sends the microcontroller Both device A and microcontroller B are assembled on the circuit board, but this design obviously increases the manufacturing cost and is not suitable for widespread use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Microcontroller object code protection method and system
  • Microcontroller object code protection method and system
  • Microcontroller object code protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] This embodiment describes in detail the microcontroller object code protection method of the present invention, and its flow chart can be found in image 3 , the storage space in the microcontroller is divided into a security key storage area, an object code ciphertext storage area, and a customer code storage area. The object code protection method is mainly divided into the following major steps:

[0060] (1) Write the security key: the IP supplier (that is, the solution provider in the figure) writes the security key into the security key storage area inside the microcontroller;

[0061] The security key is used to encrypt and decrypt the target code. In order to ensure the confidentiality of the security key, the security key must be written by the IP supplier, and can only be written by the program and read by the internal logic. Read by programs or various debugging methods (such as JTAG).

[0062] (2) Encrypted object code: the IP supplier encrypts the object co...

Embodiment 2

[0085] This embodiment describes in detail the microcontroller object code protection system of the present invention, which can be referred to Figure 5 , Figure 5 It is a schematic diagram of the internal structure of the microcontroller. As shown in the figure, the microcontroller includes a storage module, an instruction register, a program counter and a decryption module. In order to illustrate the principle of the target code protection system, only the required The memory module, instruction register, program counter and decryption module of the microcontroller, other modules in the microcontroller are in Image 6 is not drawn in detail.

[0086] The system divides the storage space in the storage module into a security key storage area (a), an object code cipher text storage area (c), and a customer code storage area (b). The text and customer code can be respectively stored in the security key storage area, the target code cipher text storage area, and the customer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of microcontroller encryption and, specifically, to a microcontroller object code protection method and system for protecting an object code of an IP supplier. The storage space in a microcontroller is divided into a secure key storage area, an object code ciphertext storage area and a customer code storage area for respectively storing a secure key, an object code ciphertext and a customer code, and the IP supplier encrypts an object code required to be protected by using a secure key and generates an object code ciphertext so that the object code ciphertext must be decrypted through a decryption module in the microcontroller when a program is running. In this way, the confidentiality of the object code is ensured, and the manufacturing and using costs are reduced as the write-in and upgrade processes of the object code ciphertext are operated by customers themselves.

Description

technical field [0001] The invention relates to the technical field of microcontroller encryption, in particular to a microcontroller target code protection method and system for protecting IP supplier target codes. Background technique [0002] Under the trend of modern industrial division of labor and cooperation, there are many design companies in the electronics industry that can support and provide circuit diagrams and core object codes of equipment solutions to customers, so that customers can carry out production and secondary development procedures. In this cooperation mode, how to guarantee The intellectual property rights independently developed by IP suppliers, such as object codes, and allowing IP suppliers to control the production quantity of customers' equipment are the key to the cooperation between developers and customers. [0003] In the prior art, a memory protection unit (MPU) is introduced into some microcontrollers, through which some code blocks can b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F21/12
CPCG06F21/12H04L9/0894
Inventor 张松波周玉洁谭永伟
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products