CN106133737A - 用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法 - Google Patents
用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法 Download PDFInfo
- Publication number
- CN106133737A CN106133737A CN201580016669.2A CN201580016669A CN106133737A CN 106133737 A CN106133737 A CN 106133737A CN 201580016669 A CN201580016669 A CN 201580016669A CN 106133737 A CN106133737 A CN 106133737A
- Authority
- CN
- China
- Prior art keywords
- token
- reactivates
- integrated circuit
- except mistake
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/31705—Debugging aspects, e.g. using test circuits for debugging, using dedicated debugging test circuits
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/31719—Security aspects, e.g. preventing unauthorised access during test
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/245,661 | 2014-04-04 | ||
| US14/245,661 US9942049B2 (en) | 2014-04-04 | 2014-04-04 | Remote station and method for re-enabling a disabled debug capability in a system-on-a-chip device |
| PCT/US2015/023518 WO2015153562A1 (en) | 2014-04-04 | 2015-03-31 | A remote station and method for re-enabling a disabled debug capability in a system-on-a-chip device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106133737A true CN106133737A (zh) | 2016-11-16 |
Family
ID=52823889
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201580016669.2A Pending CN106133737A (zh) | 2014-04-04 | 2015-03-31 | 用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US9942049B2 (enExample) |
| EP (1) | EP3127031A1 (enExample) |
| JP (1) | JP2017511654A (enExample) |
| KR (1) | KR20160140666A (enExample) |
| CN (1) | CN106133737A (enExample) |
| WO (1) | WO2015153562A1 (enExample) |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10091079B2 (en) * | 2015-05-06 | 2018-10-02 | Marvell World Trade Ltd. | Apparatus and method for remotely testing memory-mapped devices of a system-on-chip via an ethernet interface |
| US9995789B2 (en) * | 2015-12-22 | 2018-06-12 | Intel IP Corporation | Secure remote debugging of SoCs |
| CN107734569B (zh) * | 2016-08-11 | 2021-02-05 | 华为技术有限公司 | 通信方法和装置 |
| CN109818742B (zh) * | 2017-11-22 | 2023-04-25 | 中兴通讯股份有限公司 | 一种设备调试方法、装置及存储介质 |
| CN111813614B (zh) * | 2020-09-03 | 2020-12-15 | 湖北芯擎科技有限公司 | 调试处理方法、装置与调试处理系统 |
| US11665002B2 (en) | 2020-12-11 | 2023-05-30 | International Business Machines Corporation | Authenticated elevated access request |
| WO2022132184A1 (en) | 2020-12-20 | 2022-06-23 | Intel Corporation | System, method and apparatus for total storage encryption |
| US20210319138A1 (en) * | 2021-06-25 | 2021-10-14 | Intel Corporation | Utilizing logic and serial number to provide persistent unique platform secret for generation of soc root keys |
| US11874776B2 (en) | 2021-06-25 | 2024-01-16 | Intel Corporation | Cryptographic protection of memory attached over interconnects |
| US12455701B2 (en) | 2021-07-27 | 2025-10-28 | Intel Corporation | Scalable access control checking for cross-address-space data movement |
| US12487762B2 (en) | 2022-05-10 | 2025-12-02 | Intel Corporation | Flexible provisioning of coherent memory address decoders in hardware |
| KR20250102999A (ko) * | 2023-12-28 | 2025-07-07 | (주)애크멕스알마즈 | 전력반도체 SoC 및 전력반도체 SoC의 운영방법 |
| US12323503B1 (en) * | 2024-10-10 | 2025-06-03 | Moengage Inc. | Method for transmitting notification to target device via hierarchy of communication channels |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007123893A2 (en) * | 2006-04-19 | 2007-11-01 | Tellabs-Operations, Inc. | Secure keys for software activation |
| CN101278299A (zh) * | 2005-08-01 | 2008-10-01 | 英特尔公司 | 计算系统功能部件激活机制 |
| US20090165111A1 (en) * | 2007-12-21 | 2009-06-25 | General Instrument Corporation | Method and apparatus for secure management of debugging processes within communication devices |
| WO2009080700A1 (en) * | 2007-12-21 | 2009-07-02 | Telefonaktiebolaget L M Ericsson (Publ) | Secure end-of-life handling of electronic devices |
| US8214630B2 (en) * | 2009-02-24 | 2012-07-03 | General Instrument Corporation | Method and apparatus for controlling enablement of JTAG interface |
| US20140044265A1 (en) * | 2012-08-10 | 2014-02-13 | Cryptography Research, Inc. | Secure feature and key management in integrated circuits |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US62009A (en) * | 1867-02-12 | Charles t | ||
| US7248069B2 (en) * | 2003-08-11 | 2007-07-24 | Freescale Semiconductor, Inc. | Method and apparatus for providing security for debug circuitry |
| US8495361B2 (en) | 2003-12-31 | 2013-07-23 | International Business Machines Corporation | Securely creating an endorsement certificate in an insecure environment |
| JP2007226276A (ja) * | 2004-03-24 | 2007-09-06 | Matsushita Electric Ind Co Ltd | デバッグ許可装置システム |
| US20070094507A1 (en) | 2005-10-21 | 2007-04-26 | Rush Frederick A | Method and system for securing a wireless communication apparatus |
| US7921303B2 (en) | 2005-11-18 | 2011-04-05 | Qualcomm Incorporated | Mobile security system and method |
| WO2007123896A2 (en) | 2006-04-18 | 2007-11-01 | The Trustees Of The University Of Pennsylvania | Mutated acvr1 for diagnosis and treatment of fibrodyplasia ossificans progressiva (fop) |
| JP4814993B2 (ja) * | 2007-03-27 | 2011-11-16 | 富士通株式会社 | デバッグ対象機器、該認証プログラム、及びデバッグ認証方法 |
| US8677144B2 (en) | 2008-02-25 | 2014-03-18 | Cavium, Inc. | Secure software and hardware association technique |
| US9100548B2 (en) | 2008-07-17 | 2015-08-04 | Cisco Technology, Inc. | Feature enablement at a communications terminal |
| US8266684B2 (en) * | 2008-09-30 | 2012-09-11 | General Instrument Corporation | Tokenized resource access |
| US8644499B2 (en) | 2009-09-14 | 2014-02-04 | Broadcom Corporation | Method and system for securely protecting a semiconductor chip without compromising test and debug capabilities |
-
2014
- 2014-04-04 US US14/245,661 patent/US9942049B2/en active Active
-
2015
- 2015-03-31 CN CN201580016669.2A patent/CN106133737A/zh active Pending
- 2015-03-31 JP JP2016559869A patent/JP2017511654A/ja active Pending
- 2015-03-31 KR KR1020167026928A patent/KR20160140666A/ko not_active Withdrawn
- 2015-03-31 EP EP15715633.2A patent/EP3127031A1/en not_active Withdrawn
- 2015-03-31 WO PCT/US2015/023518 patent/WO2015153562A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101278299A (zh) * | 2005-08-01 | 2008-10-01 | 英特尔公司 | 计算系统功能部件激活机制 |
| WO2007123893A2 (en) * | 2006-04-19 | 2007-11-01 | Tellabs-Operations, Inc. | Secure keys for software activation |
| US20090165111A1 (en) * | 2007-12-21 | 2009-06-25 | General Instrument Corporation | Method and apparatus for secure management of debugging processes within communication devices |
| WO2009080700A1 (en) * | 2007-12-21 | 2009-07-02 | Telefonaktiebolaget L M Ericsson (Publ) | Secure end-of-life handling of electronic devices |
| US8214630B2 (en) * | 2009-02-24 | 2012-07-03 | General Instrument Corporation | Method and apparatus for controlling enablement of JTAG interface |
| US20140044265A1 (en) * | 2012-08-10 | 2014-02-13 | Cryptography Research, Inc. | Secure feature and key management in integrated circuits |
Also Published As
| Publication number | Publication date |
|---|---|
| US20150288526A1 (en) | 2015-10-08 |
| JP2017511654A (ja) | 2017-04-20 |
| EP3127031A1 (en) | 2017-02-08 |
| KR20160140666A (ko) | 2016-12-07 |
| US9942049B2 (en) | 2018-04-10 |
| WO2015153562A1 (en) | 2015-10-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106133737A (zh) | 用于在芯片上系统装置中重新启用被停用的除错能力的远程站和方法 | |
| TWI582638B (zh) | 電子器件、用於建立及強制實行與一存取控制元件相關聯之一安全性原則之方法及安全元件 | |
| CN107925570B (zh) | 用以安全地激活或撤销密钥的计算装置 | |
| US9712326B2 (en) | Method and system for backing up private key of electronic signature token | |
| CN104580208A (zh) | 一种身份认证方法及装置 | |
| CN105245552B (zh) | 实现安全控制授权的智能设备、终端设备及方法 | |
| EP2658207A1 (en) | Authorization method and terminal device | |
| EP3491576A1 (en) | Device programming with system generation | |
| TW201703557A (zh) | 分布組態器本體 | |
| US9401905B1 (en) | Transferring soft token authentication capabilities to a new device | |
| CN103532963A (zh) | 一种基于物联网设备认证方法、装置和系统 | |
| TW201234186A (en) | Methods and apparatus for access data recovery from a malfunctioning device | |
| CN108683674A (zh) | 门锁通信的验证方法、装置、终端及计算机可读存储介质 | |
| CN114175574A (zh) | 无线安全协议 | |
| CN109241726A (zh) | 一种用户权限控制方法及装置 | |
| US20130019110A1 (en) | Apparatus and method for preventing copying of terminal unique information in portable terminal | |
| CN114143312B (zh) | 基于区块链的边缘计算终端认证方法、系统及设备 | |
| CN105512519A (zh) | 数字资源版权保护方法、打开方法及装置及硬件存储设备 | |
| CN104462877B (zh) | 一种版权保护下的数字资源获取方法及系统 | |
| CN112235290B (zh) | 基于区块链的物联网设备管理方法及第一物联网设备 | |
| US9177123B1 (en) | Detecting illegitimate code generators | |
| US10671375B1 (en) | Tokenized mobile device update systems and methods | |
| CN102833213A (zh) | 一种基于令牌的网页认证登陆方法 | |
| CN109429225A (zh) | 消息接收、发送方法及装置、终端、网络功能实体 | |
| CN116260576A (zh) | 用于电力物联终端标识的生成方法、挂网使用方法及系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161116 |