JPS5848298A - Information processor - Google Patents

Information processor

Info

Publication number
JPS5848298A
JPS5848298A JP56145307A JP14530781A JPS5848298A JP S5848298 A JPS5848298 A JP S5848298A JP 56145307 A JP56145307 A JP 56145307A JP 14530781 A JP14530781 A JP 14530781A JP S5848298 A JPS5848298 A JP S5848298A
Authority
JP
Japan
Prior art keywords
address
contents
memory
code
coincidence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP56145307A
Other languages
Japanese (ja)
Inventor
Kazuhiro Endo
和宏 遠藤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp, Nippon Electric Co Ltd filed Critical NEC Corp
Priority to JP56145307A priority Critical patent/JPS5848298A/en
Publication of JPS5848298A publication Critical patent/JPS5848298A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

PURPOSE:To improve the secrecy of the memory contents, by comparing the contents corresponding to the supplied address with the contents of a cipher code and reading the memory only when the coincidence is obtained from the comparison. CONSTITUTION:The contents of an address fed from outside are set to a register 2 via an address buffer 4. In this case a cipher code is read out of a cipher code cell 8, and the contents of the register 2 are compared with the contents of the cipher code. When the coincidence is obtained from the above-mentioned comparison, a memory cell 7 is read. While an address clamping circuit 5 is set if no coincidence is obtained from the comparison. Thus the address signal fed from the buffer 4 is changed for its address code and then delivered. Therefore the cell 7 receives an access by an address having no relation with the normal address. Thus it is impossible to decode the contents of a memory, and the secrecy is improved for the memory contents.

Description

【発明の詳細な説明】 本発明は情報処理装置に関し、特に半導体メモリ内容の
秘密保護機能を有する情報処理装置に関する。
DETAILED DESCRIPTION OF THE INVENTION The present invention relates to an information processing apparatus, and more particularly to an information processing apparatus having a function of protecting the confidentiality of semiconductor memory contents.

従来のメモリ、例えばプログラム可能なROM(FRO
M)へは外部の書込手段、すなわちFROM書込器を用
いて任意の情報をプ關グラムすることができる。しかし
反面、外部からの書き込み゛である丸め轟然書き込み時
と同じ入力条件(同一アドレス指定)を満足することに
より外部から容AK書き込んだプログラムの内容を知る
ことができるという欠点があった。しかも、特にROM
社マイクロブ四グラム又はシステムの制御用情報等重畳
なソフトウェアデータの格納用として用いられ゛ること
が多く、その内容は極めて秘密性が高い。
Conventional memory, such as programmable ROM (FRO)
Any information can be programmed into M) using an external writing means, that is, a FROM writer. However, on the other hand, there is a drawback in that the contents of the program written in the AK from the outside can be known by satisfying the same input conditions (same address specification) as in the case of round-off writing, which is writing from the outside. Moreover, especially ROM
It is often used to store superimposed software data such as company micrograms or system control information, and its contents are extremely confidential.

従りて容、IKJピーできる従来の構造はシステムの独
自性を保護する上でも大きな間騙点をかかえてい丸、尚
、プログラムの秘密保護機能をもった処理装置の開発が
現在続けられているものの、経済的な負担が多かりた抄
、金物的に複雑で故障が多かりたp、秘密機構が一義的
に固定化されてしまい汎用性に芝しい等々の多くの欠点
は未だ解決されていない。
Therefore, the conventional structure that allows IKJ copying has a major disadvantage in protecting the uniqueness of the system, and the development of processing devices with a function to protect program secrecy is currently ongoing. However, many drawbacks have not yet been resolved, such as the financial burden of papermaking, the complicated hardware and frequent failures, and the lack of versatility as the secret mechanism is uniquely fixed. do not have.

本発明の目的は上記欠点を除去し、秘密性が高くかつそ
の構成が汎用的である情報処理装置を提供することにあ
る。
SUMMARY OF THE INVENTION An object of the present invention is to eliminate the above-mentioned drawbacks and provide an information processing device that is highly confidential and has a general-purpose configuration.

以下に、本発明の一実施例を図面を参照して説明する。An embodiment of the present invention will be described below with reference to the drawings.

第1図は秘密保護回路を付加したメモリ (この例では
FROM)の要部回路ブロック図である。
FIG. 1 is a block diagram of the essential circuitry of a memory (FROM in this example) to which a secret protection circuit is added.

PRONの電源が投入されるとチップ内部に設けられた
パワー七ットアッグ検出回路lが活性化され、パワーセ
ットアツタ信号がレジスタ2へ出力される。この信号に
よってレジスタ2が初期設定(入力可能状態に設定)さ
れ、外部からアトシス入力され九内容がアドレスバッフ
ァ4を介してレジスタ2ヘセツトされ今。この時、前も
ってプログラムされている暗号コードが前記パワーセッ
トアツプ検出回路1からの制御信号11によって特定の
アドレスエリアが指定される仁とによ〉暗号コードセル
8から読み出−される。前記のレジスタ2の内容とこの
暗号コードの内容とが比較回路3で比較される。
When the power to PRON is turned on, a power set-up detection circuit 1 provided inside the chip is activated, and a power set-up detection circuit 1 is outputted to the register 2. This signal initializes register 2 (sets it to an input enabled state), and the contents input from the outside are set into register 2 via address buffer 4. At this time, the previously programmed cryptographic code is read out from the cryptographic code cell 8 by means of a specific address area designated by the control signal 11 from the power set-up detection circuit 1. A comparator circuit 3 compares the contents of the register 2 and the contents of this encryption code.

両者の内容が一致した場合には、比較回路3からアドレ
ススクランブラ回路5ヘリセット信号が出力され、この
信号によってリセットされ九アドレススクランプツ回路
はアドレスバッファ4からそれ以降に出力されるアドレ
スデータをそのままの形でアドレスデー−ダ6へ転送す
る。
If the contents of the two match, the address scrambler circuit 5 reset signal is output from the comparator circuit 3, and the address scrambler circuit 5 is reset by this signal and the 9 address scrambler circuit receives the address data that will be output from the address buffer 4 thereafter. The data is transferred to the address data 6 as is.

一方1両者の内容が不一致の場合には、比較回路3から
アドレススクランブラセット信号がtlされ、アドレス
スクランブラ回路5がセットされる。アドレススクラン
ブラ回路5がセットされると一アドレスバッファ4から
入力されたアドレス信号はそのアドレスー−ドとは異な
るコ′−ドに変更されて出力されるため、正規のアドレ
スとは一関係のアドレスとなってメモリセル7をアクセ
スしてしまう、尚、9.toは夫々データバス側のリー
ド/ライトデコーダ及び出力バッファである。
On the other hand, if the contents of the two do not match, the address scrambler set signal is sent from the comparison circuit 3 to t1, and the address scrambler circuit 5 is set. When the address scrambler circuit 5 is set, the address signal input from the address buffer 4 is changed to a code different from that address code and output, so the address signal is different from the regular address. 9. to are a read/write decoder and an output buffer on the data bus side, respectively.

この動作により明らかなように、レジスタ2の内容と暗
号コードの内容とが一致した場合にのみ、正常なメ毎り
の読出しが行なわれ、それ以外の場合は無意味なデータ
が出力される仁とKなる。従って、暗号コードを知って
いる者のみが、間違いなくメモリアクセスすることがで
11%知らない者が操1作、しても正常なプログラム処
理はできない。
As is clear from this operation, only when the contents of register 2 and the contents of the encryption code match, a normal readout of each message is performed; otherwise, meaningless data is output. and K. Therefore, only those who know the encryption code can access the memory without fail, and even if someone who does not know the code performs one operation, normal program processing will not be possible.

すなわち、メモリ内容を解読することはできず。In other words, the contents of memory cannot be deciphered.

メモリ内容の秘密保護は確実となる。即ち、メモリにセ
ットされているプ嘗グラ五の順序はわからない。
The confidentiality of memory contents is ensured. That is, the order of the programs set in memory is unknown.

以上の機能は特にFROMを具体例として説明し九が、
本発明はその他の半導体メモリ全般を通して適用可能で
ある。ま九暗号コードが不一致の場合、その検出信号に
よりアドレス入力を禁止するようにしてもよいが、それ
だけでは入力するアドレスを任意に変化させればいつか
は正規の暗号うにアクセスを禁止するのではなく、アド
レスコードを変化させる(これは特にアドレスを用いて
それを変更する場合と、アドレスは禁止しても他の乱数
カウンタ等から規則性のないメモリを発生させる場合の
いづれでもよい)ようにした方が、プログラム保護はよ
り効果的である。
The above functions will be explained using FROM as a specific example.
The present invention is applicable to all other semiconductor memories. If the encryption codes do not match, the detection signal may be used to prohibit address input, but this is not enough to prevent access to the legitimate encryption code by arbitrarily changing the input address. , the address code can be changed (this can be done either by using an address and changing it, or if the address is prohibited but irregular memory is generated from another random number counter, etc.) program protection is more effective.

更に、暗号コードセル部分8はRAλイおよびROMで
はマスクROMを用いる方が暗号スートを任意にセット
できるという点で汎用性があり適切である。しかし他に
EFROM、とニーズ溶新式あるいは接合破壊式バイポ
ーラFROMめセル構造を用いることKよりても容J&
に実現することができる。又、比較回路の動作は電源オ
ン時に@定したが、例えば外部からのキー操作等により
、所望の時期に限って動作させることができるようKし
てもよい。加えて、アドレス入力社キー操作でもよけれ
ば、システム内部でのプログラム処理の一環としてでも
よい。更に、かかる構造は独立しまたメモリチップとし
て構成すること、又1チツプ゛CPUの中に含ませるζ
モ等、その製造には同等制限はなりことが明白である。
Furthermore, for the encryption code cell portion 8, it is more appropriate to use a mask ROM for the RAλ and ROM because it is more versatile and allows the encryption suite to be arbitrarily set. However, there are other types of EFROM, such as fusion type or junction breakdown type bipolar FROM, that use a cell structure that is more efficient than K.
can be realized. Further, although the operation of the comparator circuit is set at the time of power-on, it may be set to operate only at a desired time by, for example, an external key operation. In addition, address input may be performed by key operation, or as part of program processing within the system. Furthermore, such a structure can be configured independently and as a memory chip, or can be included in a single chip CPU.
It is clear that equivalent restrictions apply to the manufacture of such products.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は秘密保護回路を付加した本発明の一実施による
メモリの要部回路プ四ツク図である。
FIG. 1 is a circuit diagram of a main part of a memory according to an embodiment of the present invention, which includes a security protection circuit.

Claims (1)

【特許請求の範囲】[Claims] 暗号コードを有する手段と、前記暗号;−ドに和尚する
コードを入力する手段と、両省を比較して一致したら一
致信号を発生し、これによって入力されるアドレスに対
応するメ峰す情報を読み出す手段とを含むことを特徴と
する情報処理装置。
A means having an encrypted code and a means for inputting a code to the above-mentioned encrypted code are compared, and if they match, a matching signal is generated, and thereby the message information corresponding to the input address is read out. An information processing device comprising: means.
JP56145307A 1981-09-14 1981-09-14 Information processor Pending JPS5848298A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP56145307A JPS5848298A (en) 1981-09-14 1981-09-14 Information processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP56145307A JPS5848298A (en) 1981-09-14 1981-09-14 Information processor

Publications (1)

Publication Number Publication Date
JPS5848298A true JPS5848298A (en) 1983-03-22

Family

ID=15382121

Family Applications (1)

Application Number Title Priority Date Filing Date
JP56145307A Pending JPS5848298A (en) 1981-09-14 1981-09-14 Information processor

Country Status (1)

Country Link
JP (1) JPS5848298A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6011931A (en) * 1983-06-30 1985-01-22 Fujitsu Ltd One-chip microcomputer
JPS63229544A (en) * 1987-03-19 1988-09-26 Nkk Corp Data base device for ship
JPS63192840U (en) * 1987-05-27 1988-12-12
JPH05189322A (en) * 1992-01-08 1993-07-30 Mitsubishi Electric Corp Microcomputer
JPH06208516A (en) * 1992-10-27 1994-07-26 Toshiba Corp Security circuit

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS55140960A (en) * 1979-04-18 1980-11-04 Mitsubishi Electric Corp Memory device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS55140960A (en) * 1979-04-18 1980-11-04 Mitsubishi Electric Corp Memory device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6011931A (en) * 1983-06-30 1985-01-22 Fujitsu Ltd One-chip microcomputer
JPS6313210B2 (en) * 1983-06-30 1988-03-24 Fujitsu Ltd
JPS63229544A (en) * 1987-03-19 1988-09-26 Nkk Corp Data base device for ship
JPS63192840U (en) * 1987-05-27 1988-12-12
JPH05189322A (en) * 1992-01-08 1993-07-30 Mitsubishi Electric Corp Microcomputer
JPH06208516A (en) * 1992-10-27 1994-07-26 Toshiba Corp Security circuit

Similar Documents

Publication Publication Date Title
KR930008041B1 (en) Microcontroller
US5224166A (en) System for seamless processing of encrypted and non-encrypted data and instructions
US5034980A (en) Microprocessor for providing copy protection
EP0114522A2 (en) ROM protection device
KR100294829B1 (en) Method and apparatus for protecting flash memory
JP2710754B2 (en) Device to protect chip card keys
JPH09259045A (en) Security system device for memory card and the memory card
US9081724B2 (en) Method and device for protecting memory content using first and second addressable storage regions and first and second encryption keys
JP2000347942A (en) Information processor
WO2017028642A1 (en) Memory access control method and device, and computer storage medium
CN101673251A (en) Device with privileged memory and applications thereof
JP2001513929A (en) Electronic data processing devices and systems
EP0008033B1 (en) Microprocessor for executing enciphered programs
KR100358705B1 (en) An apparatus for information protection using Universal Serial Bus(USB) security module and crypto-chip based on PC
JPS5848298A (en) Information processor
JPS63293637A (en) Data protecting microcomputer
JPS63211045A (en) Portable electronic equipment
CN114237492A (en) Nonvolatile memory protection method and device
KR20020071274A (en) Universal Serial Bus(USB) security secondary storage device using Crypto Chip and Flash memory based on PC
JPS6358538A (en) Software protecting system
JPS63211049A (en) Portable electronic equipment
JPS63197293A (en) Ic card issuing system
US20230208821A1 (en) Method and device for protecting and managing keys
JPS6361393A (en) Memory card
JPS61168061A (en) Data protecting system