Supercharge Your Innovation With Domain-Expert AI Agents!

A program protection method and system in an embedded processor based on risc-v architecture

An embedded processor, RISC-V technology, used in program/content distribution protection, instrument, platform integrity maintenance, etc.

Active Publication Date: 2021-10-12
广芯微电子(广州)股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of method often needs to introduce complex circuit control to complete the protection of the application program in the implementation, which brings additional cost to the chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A program protection method and system in an embedded processor based on risc-v architecture
  • A program protection method and system in an embedded processor based on risc-v architecture
  • A program protection method and system in an embedded processor based on risc-v architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0065] It should be understood that the step numbers used herein are only for convenience of description, and are not intended to limit the execution order of the steps.

[0066] It should be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to limit the present invention. As used in this specification and the appended claims, the singular forms "a", "an"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a program protection method in an embedded processor based on RISC-V architecture. The method is executed by a computer main control unit, including: controlling the program counter judgment module PC_Area_Judge according to the start address AddrStart, the end address AddrEnd and the PC The data relationship between data values ​​generates the program counter output signal PC_Judge; the control target area judgment module Target_Area_Judge generates the target area output signal Target_Judge according to the data relationship between the start address AddrStart, end address AddrEnd and ADDR data values; control program execution The module Protect_Execution performs logical calculation according to the program counter output signal PC_Judge, the target area output signal Target_Judge and the flag signal DATA_ACCESS currently operated by the CPU, judges whether the access is legal according to the result of the logical calculation, and implements embedding according to the legality of the access result Program protection in modem processors. The program protection method of the invention has simple control circuit, improves program security, reduces chip manufacturing cost, and is very suitable for use in embedded processors.

Description

technical field [0001] The present invention relates to the technical field of embedded systems, in particular to a program protection method and system in an embedded processor based on RISC-V architecture. Background technique [0002] RISC-V is an open source instruction set architecture based on the principles of the RISC instruction set. Compared with most existing instruction sets, RISC-V has almost no restrictions in application, allowing the freedom to design, manufacture and sell RISC-V chips and software. Although RISC-V is not the first open source instruction set, its emergence is significant because the RISC-V instruction set architecture is more suitable for modern computing devices (such as warehouse-scale cloud computers, high-end mobile phones and tiny embedded systems). The instruction set also has extensive software support, which addresses the usual weaknesses of new instruction sets. [0003] In recent years, as many products such as smart phones, PDAs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/54G06M1/272
CPCG06F21/14G06F21/54G06M1/272
Inventor 王锐张良臣李建军莫军王亚波
Owner 广芯微电子(广州)股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More