Supercharge Your Innovation With Domain-Expert AI Agents!

Chip debugging enable control method

A control method, chip technology, applied in functional inspection, instrumentation, error detection/correction, etc., can solve problems such as lack of security, loss of interests of chip manufacturers or equipment manufacturers or end customers, leakage of assets and confidential information, etc. achieve the effect of protecting safety

Active Publication Date: 2022-02-08
无锡众星微系统技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1) For Scenario 1 in Table 1, the chip cannot be debugged through the debugging interface. Once a functional problem occurs in the normal operation of the chip after productization, it will not be possible to debug and analyze the chip to accurately locate the cause of the problem.
[0012] 2) For Scenario 2 in Table 1, the chip is always in a debuggable state during the development and testing process, and there is no security certification control for the enabling of the debugging interface, resulting in assets and confidential information that need to be protected in the chip May be leaked, resulting in loss of interests for chip manufacturers or equipment manufacturers or end customers
[0013] 3) For scene 4 in Table 1, it is often used when the chip (in the setting of scene 3) needs to be debugged after a problem occurs during operation, and the software debugging enable control occurs in the startup code of the chip (Boot- Code), in general, in order to achieve a safe boot, the startup code of the chip is solidified, once the problem occurs in the startup phase of the chip, it will not be possible to debug and analyze the chip to accurately locate the cause of the problem
[0017] 1) The knock code is preset and fixed, and it is easy to leak; 2) The knock code is easy to crack, for example, it can be cracked by detecting the debug connection and the debug interface between the chip, or it can be cracked by multiple attempts. so there is no real security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip debugging enable control method
  • Chip debugging enable control method
  • Chip debugging enable control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] In order to completely solve the contradiction between the debuggability and security of the chip, the present invention proposes a safe debugging enabling control method, which uses asymmetric cryptography technology to authenticate the identity of the debugger. The debugging terminal of the legality authentication jud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a chip debugging control method, which is used for controlling the debugging of a chip to be debugged by a debugging terminal, including: authenticating the identity of the debugging terminal through a security debugging authentication system of the chip to be debugged; When the identity legality authentication is passed, the debugging terminal is allowed to debug the chip to be debugged through the debugging interface; otherwise, the debugging terminal is not allowed to debug the chip to be debugged through the debugging interface. The invention satisfies the debuggability requirements of the chip at various stages, satisfies the security requirements, and effectively protects the security of assets or information in the chip.

Description

technical field [0001] The invention belongs to the field of chip design, in particular to a chip debugging enable control method. Background technique [0002] Chip debugging is an essential process in the chip design process. Controlling the debugging and enabling of the chip plays a vital role in protecting the assets and information security in the chip. A traditional solution for controlling chip debug enablement uses a hierarchical control method combining software and hardware, and hardware debug enable control has a higher priority than software debug enable control. If the hardware disables debugging, the debugging will be disabled; if the hardware does not disable debugging and the software debug enable control is disabled by hardware, then allow debugging; if the hardware does not disable debugging and the software debug enable control is enabled by hardware, then according to the software Debug enable control to decide whether to allow debugging, if the softwar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/22G06F11/26
CPCG06F11/2236G06F11/26
Inventor 李兵刁永翔张辅云宫晓渊
Owner 无锡众星微系统技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More