CN106133737A - 用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法 - Google Patents

用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法 Download PDF

Info

Publication number
CN106133737A
CN106133737A CN201580016669.2A CN201580016669A CN106133737A CN 106133737 A CN106133737 A CN 106133737A CN 201580016669 A CN201580016669 A CN 201580016669A CN 106133737 A CN106133737 A CN 106133737A
Authority
CN
China
Prior art keywords
token
reactivates
integrated circuit
except mistake
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201580016669.2A
Other languages
English (en)
Chinese (zh)
Inventor
伊万·休·麦克莱恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN106133737A publication Critical patent/CN106133737A/zh
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/31705Debugging aspects, e.g. using test circuits for debugging, using dedicated debugging test circuits
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/31719Security aspects, e.g. preventing unauthorised access during test
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
CN201580016669.2A 2014-04-04 2015-03-31 用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法 Pending CN106133737A (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/245,661 2014-04-04
US14/245,661 US9942049B2 (en) 2014-04-04 2014-04-04 Remote station and method for re-enabling a disabled debug capability in a system-on-a-chip device
PCT/US2015/023518 WO2015153562A1 (en) 2014-04-04 2015-03-31 A remote station and method for re-enabling a disabled debug capability in a system-on-a-chip device

Publications (1)

Publication Number Publication Date
CN106133737A true CN106133737A (zh) 2016-11-16

Family

ID=52823889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580016669.2A Pending CN106133737A (zh) 2014-04-04 2015-03-31 用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法

Country Status (6)

Country Link
US (1) US9942049B2 (enExample)
EP (1) EP3127031A1 (enExample)
JP (1) JP2017511654A (enExample)
KR (1) KR20160140666A (enExample)
CN (1) CN106133737A (enExample)
WO (1) WO2015153562A1 (enExample)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10091079B2 (en) * 2015-05-06 2018-10-02 Marvell World Trade Ltd. Apparatus and method for remotely testing memory-mapped devices of a system-on-chip via an ethernet interface
US9995789B2 (en) * 2015-12-22 2018-06-12 Intel IP Corporation Secure remote debugging of SoCs
CN107734569B (zh) * 2016-08-11 2021-02-05 华为技术有限公司 通信方法和装置
CN109818742B (zh) * 2017-11-22 2023-04-25 中兴通讯股份有限公司 一种设备调试方法、装置及存储介质
CN111813614B (zh) * 2020-09-03 2020-12-15 湖北芯擎科技有限公司 调试处理方法、装置与调试处理系统
US11665002B2 (en) 2020-12-11 2023-05-30 International Business Machines Corporation Authenticated elevated access request
WO2022132184A1 (en) 2020-12-20 2022-06-23 Intel Corporation System, method and apparatus for total storage encryption
US20210319138A1 (en) * 2021-06-25 2021-10-14 Intel Corporation Utilizing logic and serial number to provide persistent unique platform secret for generation of soc root keys
US11874776B2 (en) 2021-06-25 2024-01-16 Intel Corporation Cryptographic protection of memory attached over interconnects
US12455701B2 (en) 2021-07-27 2025-10-28 Intel Corporation Scalable access control checking for cross-address-space data movement
US12487762B2 (en) 2022-05-10 2025-12-02 Intel Corporation Flexible provisioning of coherent memory address decoders in hardware
KR20250102999A (ko) * 2023-12-28 2025-07-07 (주)애크멕스알마즈 전력반도체 SoC 및 전력반도체 SoC의 운영방법
US12323503B1 (en) * 2024-10-10 2025-06-03 Moengage Inc. Method for transmitting notification to target device via hierarchy of communication channels

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007123893A2 (en) * 2006-04-19 2007-11-01 Tellabs-Operations, Inc. Secure keys for software activation
CN101278299A (zh) * 2005-08-01 2008-10-01 英特尔公司 计算系统功能部件激活机制
US20090165111A1 (en) * 2007-12-21 2009-06-25 General Instrument Corporation Method and apparatus for secure management of debugging processes within communication devices
WO2009080700A1 (en) * 2007-12-21 2009-07-02 Telefonaktiebolaget L M Ericsson (Publ) Secure end-of-life handling of electronic devices
US8214630B2 (en) * 2009-02-24 2012-07-03 General Instrument Corporation Method and apparatus for controlling enablement of JTAG interface
US20140044265A1 (en) * 2012-08-10 2014-02-13 Cryptography Research, Inc. Secure feature and key management in integrated circuits

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US62009A (en) * 1867-02-12 Charles t
US7248069B2 (en) * 2003-08-11 2007-07-24 Freescale Semiconductor, Inc. Method and apparatus for providing security for debug circuitry
US8495361B2 (en) 2003-12-31 2013-07-23 International Business Machines Corporation Securely creating an endorsement certificate in an insecure environment
JP2007226276A (ja) * 2004-03-24 2007-09-06 Matsushita Electric Ind Co Ltd デバッグ許可装置システム
US20070094507A1 (en) 2005-10-21 2007-04-26 Rush Frederick A Method and system for securing a wireless communication apparatus
US7921303B2 (en) 2005-11-18 2011-04-05 Qualcomm Incorporated Mobile security system and method
WO2007123896A2 (en) 2006-04-18 2007-11-01 The Trustees Of The University Of Pennsylvania Mutated acvr1 for diagnosis and treatment of fibrodyplasia ossificans progressiva (fop)
JP4814993B2 (ja) * 2007-03-27 2011-11-16 富士通株式会社 デバッグ対象機器、該認証プログラム、及びデバッグ認証方法
US8677144B2 (en) 2008-02-25 2014-03-18 Cavium, Inc. Secure software and hardware association technique
US9100548B2 (en) 2008-07-17 2015-08-04 Cisco Technology, Inc. Feature enablement at a communications terminal
US8266684B2 (en) * 2008-09-30 2012-09-11 General Instrument Corporation Tokenized resource access
US8644499B2 (en) 2009-09-14 2014-02-04 Broadcom Corporation Method and system for securely protecting a semiconductor chip without compromising test and debug capabilities

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101278299A (zh) * 2005-08-01 2008-10-01 英特尔公司 计算系统功能部件激活机制
WO2007123893A2 (en) * 2006-04-19 2007-11-01 Tellabs-Operations, Inc. Secure keys for software activation
US20090165111A1 (en) * 2007-12-21 2009-06-25 General Instrument Corporation Method and apparatus for secure management of debugging processes within communication devices
WO2009080700A1 (en) * 2007-12-21 2009-07-02 Telefonaktiebolaget L M Ericsson (Publ) Secure end-of-life handling of electronic devices
US8214630B2 (en) * 2009-02-24 2012-07-03 General Instrument Corporation Method and apparatus for controlling enablement of JTAG interface
US20140044265A1 (en) * 2012-08-10 2014-02-13 Cryptography Research, Inc. Secure feature and key management in integrated circuits

Also Published As

Publication number Publication date
US20150288526A1 (en) 2015-10-08
JP2017511654A (ja) 2017-04-20
EP3127031A1 (en) 2017-02-08
KR20160140666A (ko) 2016-12-07
US9942049B2 (en) 2018-04-10
WO2015153562A1 (en) 2015-10-08

Similar Documents

Publication Publication Date Title
CN106133737A (zh) 用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法
TWI582638B (zh) 電子器件、用於建立及強制實行與一存取控制元件相關聯之一安全性原則之方法及安全元件
CN107925570B (zh) 用以安全地激活或撤销密钥的计算装置
US9712326B2 (en) Method and system for backing up private key of electronic signature token
CN104580208A (zh) 一种身份认证方法及装置
CN105245552B (zh) 实现安全控制授权的智能设备、终端设备及方法
EP2658207A1 (en) Authorization method and terminal device
EP3491576A1 (en) Device programming with system generation
TW201703557A (zh) 分布組態器本體
US9401905B1 (en) Transferring soft token authentication capabilities to a new device
CN103532963A (zh) 一种基于物联网设备认证方法、装置和系统
TW201234186A (en) Methods and apparatus for access data recovery from a malfunctioning device
CN108683674A (zh) 门锁通信的验证方法、装置、终端及计算机可读存储介质
CN114175574A (zh) 无线安全协议
CN109241726A (zh) 一种用户权限控制方法及装置
US20130019110A1 (en) Apparatus and method for preventing copying of terminal unique information in portable terminal
CN114143312B (zh) 基于区块链的边缘计算终端认证方法、系统及设备
CN105512519A (zh) 数字资源版权保护方法、打开方法及装置及硬件存储设备
CN104462877B (zh) 一种版权保护下的数字资源获取方法及系统
CN112235290B (zh) 基于区块链的物联网设备管理方法及第一物联网设备
US9177123B1 (en) Detecting illegitimate code generators
US10671375B1 (en) Tokenized mobile device update systems and methods
CN102833213A (zh) 一种基于令牌的网页认证登陆方法
CN109429225A (zh) 消息接收、发送方法及装置、终端、网络功能实体
CN116260576A (zh) 用于电力物联终端标识的生成方法、挂网使用方法及系统

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161116