A key generation and verification method and system based on a hardware device

A hardware device and key technology, which are applied in the field of key generation and verification methods for port protection and systems thereof, can solve problems such as tracking and positioning of unfavorable problems, debugging and solving, and achieve the effect of facilitating tracking and positioning problems and preventing hacker attacks.

Pending Publication Date: 2019-03-08
贵州华芯半导体技术有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of directly closing the Debug port can safely protect the internal resources of the chip, but if there is a problem, it is very unfavorable for engineers to track, locate and debug the problem.
The second method uses a daemon process to protect the Debug port. Although the Debug port can be protected to a certain extent, this method is easily cracked and attacked by hackers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key generation and verification method and system based on a hardware device
  • A key generation and verification method and system based on a hardware device
  • A key generation and verification method and system based on a hardware device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The components of the disclosed embodiments generally described and shown in the drawings may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the present disclosure provided in the accompanying drawings is not intended to limit the scope of the claimed disclosure, but merely represents selected embodiments of the present disclosure. Based on the embodiments of the present disclosure, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present disclosure.

[0025] It should be noted that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key generation and verification method and system for product port protection based on a hardware device. The generation and verification method includes generating and verifying data; generating a root key by an authorized first hardware device connected with the production line controller; adopting a national cryptographic algorithm by an authorized second hardware device connected with the production line controller; utilizing root keys, generating an application key by using the product identifier as a dispersion factor, generating a key for port protection by using the application key and the product identifier as a dispersion factor by using an authorized third hardware device connected with a production line controller by using a national cryptographic algorithm, and writing the key for port protection into a protection domain of the product by using the production line controller; and reading, by the third hardware device, the application key from its base file, using the national cryptographic algorithm, using the application key, using the product identifier as a dispersion factor to generate a key for port protection, and comparing, by the production line controller, the generated key with the key in the protection domain to verify the port.

Description

technical field [0001] The present disclosure relates to a port protection method and system thereof, and more particularly, to a key generation and verification method for port protection of a product based on a hardware device and a system thereof. Background technique [0002] Debug ports are ports included with the device to simplify development and debugging, which are not required for proper operation of the device. The Debug port is usually not deleted or disabled, which avoids the cost of changing the design and is also helpful for engineers to trace, locate and debug problems. However, if the Debug port is not protected, the port will become an important interface for hackers or competitors to attack. For example: JTAG interface on the chip, LPC (Low PinCount) Debug port, Serial Wire Debug, Background Debug Mode Interface and Programand Debug Interface, etc. [0003] At present, there are roughly two protection methods adopted for the Debug port: one is to directl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 于永庆张帆刘航隆婷靳慧杰金正雄
Owner 贵州华芯半导体技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products