Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for debugging a microprocessor and the microprocessor

A microprocessor and encryption algorithm technology, applied in the computer field, can solve problems such as illegally refreshing microprocessors and stealing, and achieve the effect of improving flexibility and security

Active Publication Date: 2021-03-12
GREE ELECTRIC APPLIANCES INC
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in this way, criminals can steal the firmware in the microprocessor through the debugging interface, or illegally refresh the firmware in the microprocessor, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for debugging a microprocessor and the microprocessor
  • A method for debugging a microprocessor and the microprocessor
  • A method for debugging a microprocessor and the microprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to better understand the technical solutions provided by the embodiments of the present application, a detailed description will be given below in conjunction with the accompanying drawings and specific implementation manners.

[0055] The technical terms involved in the embodiments of the present application are explained below.

[0056](1) Key pair. In asymmetric encryption technology, there are two kinds of keys, which are divided into private key and public key. The private key is held by the owner of the key pair and cannot be published. The public key is held by the key pair. announced to other parties.

[0057] (2) The private key is the key in asymmetric encryption, which is used to decrypt the data encrypted by the public key.

[0058] (3) Public key, the public key is used to encrypt data, and the data encrypted with the public key can only be decrypted with the private key.

[0059] The prior art related to this application will be described below....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for debugging a microprocessor and the microprocessor, which are used for improving safety of data in the microprocessor. The method comprises the steps of sending a signature certificate to at least one device, so that each device in the at least one device decrypts the signature certificate according to a pre-stored first public key, and acquiring a second publickey in the decrypted signature certificate wherein the at least one device is a device having the authority to debug the microprocessor; receiving a first debugging request; wherein the first debugging request is sent by first equipment and carries first identity verification information encrypted by a public key stored in the first equipment; decrypting the first identity verification informationaccording to a pre-stored first private key; wherein the first private key corresponds to the second public key; and under the condition that the first identity verification information is successfully decrypted, receiving debugging information sent by the first equipment, and debugging according to the debugging information.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method for debugging a microprocessor and the microprocessor. Background technique [0002] In order to facilitate the debugging of the microprocessor by later manufacturers, the microprocessor generally sets a debugging interface. When the manufacturer needs to debug the microprocessor, it can send the debugging information to the microprocessor through the debugging interface. [0003] Usually, in order to facilitate the manufacturer to debug the microprocessor, the debugging interface is generally open to the outside world. However, in this way, criminals can steal the firmware in the microprocessor through the debugging interface, or illegally refresh the firmware in the microprocessor. Contents of the invention [0004] Embodiments of the present application provide a method for debugging a microprocessor and the microprocessor, which are used to improve da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/64G06F11/22G06F11/26
CPCG06F11/2236G06F11/26G06F21/602G06F21/64
Inventor 昌明涛
Owner GREE ELECTRIC APPLIANCES INC