CN109145527A - The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence - Google Patents

The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence Download PDF

Info

Publication number
CN109145527A
CN109145527A CN201810651407.9A CN201810651407A CN109145527A CN 109145527 A CN109145527 A CN 109145527A CN 201810651407 A CN201810651407 A CN 201810651407A CN 109145527 A CN109145527 A CN 109145527A
Authority
CN
China
Prior art keywords
protection
equipment
training sequence
identification information
configuration state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810651407.9A
Other languages
Chinese (zh)
Other versions
CN109145527B (en
Inventor
范凯
卢笙
姜欣
肖骁
董晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd
Original Assignee
Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd filed Critical Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd
Priority to CN201810651407.9A priority Critical patent/CN109145527B/en
Publication of CN109145527A publication Critical patent/CN109145527A/en
Application granted granted Critical
Publication of CN109145527B publication Critical patent/CN109145527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Transfer Systems (AREA)

Abstract

The present invention provides the soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence; wherein; the soft core property right protection method of IP based on USB3.1 agreement TS2 training sequence is applied to USB3.1 equipment, comprising: detects whether the trigger condition for meeting preset protection recognition mode;If so, current working status is switched to the protection recognition mode;Wherein, under the working condition of the protection recognition mode, and protection identification information is carried into the reserve bytes of TS2 training sequence transmitted by usb host in Polling.Configuration state and/or Recovery.Configuration state.The present invention has effectively achieved the intellectual property protection and identification to the soft core of USB3.1 using with by the way of the binding of USB3.1 protocol depth.

Description

The soft core property right protection of IP and infringement based on USB3.1 agreement TS2 training sequence are identified Method
Technical field
The present invention relates to the silicon intellectual property technical fields of USB device, instruct more particularly to the TS2 based on USB3.1 agreement The soft core of IP of the property right protection method and device and TS2 training sequence based on USB3.1 agreement of the soft core of IP of white silk sequence is invaded Weigh identification method and device, and corresponding storage medium and electronic equipment.
Background technique
USB is the abbreviation of English Universal Serial Bus (universal serial bus), is a kind of external bus standard, For being connected and communicate with for specification computer and external equipment.The plug and play and warm connection function of USB interface holding equipment.USB Standard will be proposed in the end of the year 1994 by Intel, Compaq, IBM, Microsoft Deng Duo company joint, through being widely used In each class of electronic devices such as computer, mobile phone, digital camera.USB standard is formulated and is safeguarded by USB official organization USB-IF, from opening Beginning has successively issued USB1.1, USB2.0, USB3.0, USB3.1 and USB3.2 totally five versions, new version forward compatibility so far Legacy version.The peak transfer rate distribution that each version is supported are as follows: USB1.1:12Mbps;USB2.0:480Mbps;USB3.0: 5Gbps;USB3.1:10Gbps;USB3.2:20Gbps.
Silicon intellectual property (SIP, Silicon Intellectual Property) refers to a kind of thing in chip (IC) industry First definition, verified module may be reused, that specific function can be completed.With mentioning for chip complexity and integrated level It rises, processor, memory, the port I/O and analog circuit are all integrated on a silicon wafer, form a complete system on chip (SOC, System On Chip), if from the beginning each module of SOC product new each time will design and then is again System integration and verifying certainly will will lead to the extension of development cycle, and the quality designed is also difficult to control.Therefore, it repeats to make With being pre-designed and authenticated integrated circuit modules (IP) are the most effective solutions of current industry.
It distinguishes, IP can be divided for soft core, solid core, stone three types from design cycle:
1, the soft core of IP (Soft IP)
During logic IC design, IC designer can use hardware description language after the completion of the system specification is formulated Function needed for system is write out to the program of Method at Register Transfer Level (RTL, Register Transfer Level), this RTL text Part is thus referred to as the soft core of IP.
Since the soft core of IP is provided in the form of source code, so flexibility with higher, can come real through user's modification Design of circuit system required for existing, and it is unrelated with concrete implementation technique, but the disadvantage is that independent intellectual property right is not readily available Protection, especially for standard agreement IP (such as USB3.1), even if encrypting to code, client still can adding the same IP Close code is duplicate to be used in different SOC projects.
2, IP consolidates core (Firm IP)
RTL program passes through simulating, verifying, after meeting design requirement, designer by electronic design automation tool (EDA), Corresponding logic gate is chosen from the cell library (Cell Library), RTL file is converted into the form of logic gate be in Existing netlist (Netlist) file, this net meter file, that is, so-called IP consolidate core.
IP consolidates the compromise that core is IP soft core and IP stone, the high reliablity of its core softer than IP, than the strong flexibility of IP stone, But the no soft core of image of Buddha IP is the same to carry out logic Modification according to the demand of client.
3, IP stone (Hard IP)
Net meter file is after verifying, and the step of into entity design, the position for first carrying out functional blocks configures design (Floor Planning), then be laid out with wires design (Place&Routing), finish institute after the layout and wiring of entity The GDSII file of generation, as IP stone.
The design and craft of IP stone has been completed and can not have been modified, the IP stone that user obtains be only product function without Product design, thus IP stone design and manufacturer full powers control is carried out to it.Consolidate core, IP relative to the soft core of IP and IP The intellectual property protection of stone is also fairly simple.
USB3.1IP is a kind of standard IP being widely used, and takes effective measures and carries out intellectual property protection to it and be Very necessary.However, this field rarely has the research approach for carrying out intellectual property protection to the soft core of the IP of USB3.1 equipment.
Summary of the invention
In view of the foregoing deficiencies of prior art, the purpose of the present invention is to provide based on USB3.1 agreement TS2 training The soft core property right protection of the IP of sequence and infringement identification method, are difficult in the prior art for solving to the soft core of the IP of USB3.1 equipment The technical issues of carrying out intellectual property protection.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence The soft core property right protection method of IP, be applied to USB3.1 equipment, which comprises detect whether to meet preset protection and identify The trigger condition of mode;If so, current working status is switched to the protection recognition mode;Wherein, know in the protection Under the working condition of other mode, and in Polling.Configuration state and/or Recovery.Configuration shape State carries protection identification information into the reserve bytes of TS2 training sequence transmitted by usb host.
In one embodiment of the invention, the trigger condition of the preset protection recognition mode includes: trigger condition 1) it connects The usb host in Polling.Configuration state and/or Recovery.Configuration state is received to be sent out The TS2 training sequence of specific information is carried in the reserve bytes sent;And/or trigger condition 2) receive in U0 state The user that specific information is carried transmitted by usb host tests link management data packet;Wherein, meeting the trigger condition 1) when, the USB3.1 equipment correspondingly enter Polling.Configuration state and/or Recovery.Configuration state, and sent to the usb host and carry protection identification information in reserve bytes TS2 training sequence;Meeting the trigger condition 2) when, the USB3.1 equipment enters Recovery.Configuration shape State, and the TS2 training sequence that protection identification information is carried in reserve bytes is sent to the usb host.
In one embodiment of the invention, it is described in Polling.Configuration state and/or The step of sending TS2 training sequence to usb host under Recovery.Configuration state further include: periodically send The TS2 training sequence of protection information is carried in reserve bytes;Wherein, each protection identification information in the period is temporally first Sequence arrangement forms authorization customer name, product batches information, and/or authorization temporal information afterwards.
In one embodiment of the invention, the reserve bytes are the 5th byte of the TS2 training sequence.
In one embodiment of the invention, the protection identification information uses ASCII character coding to generate in advance.
In one embodiment of the invention, the method also includes: it is re-powering or is receiving as transmitted by usb host After reset request, the protection recognition mode is exited.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence The soft core of IP encroach right identification method, be applied to usb protocol analytical equipment, which comprises capture USB3.1 equipment is in protection Under the working condition of recognition mode, and in Polling.Configuration state and/or Recovery.Configuration State is to TS2 training sequence transmitted by usb host;Extract the protection identification letter in the reserve bytes of the TS2 training sequence Breath;Judge whether the protection identification information matches with default protection identification information;If so, assert the USB3.1 equipment Infringement.
In one embodiment of the invention, the method also includes: if being not present in the reserve bytes of the TS2 training sequence The protection identification information then assert that the USB3.1 equipment is not target device.
In one embodiment of the invention, the method also includes: continuous capture certain time or a certain number of TS2 Training sequence;The protection identification information of each TS2 training sequence of capture is extracted, and on time by each protection identification information Between sequencing arrangement with restore authorization customer name, product batches information, and/or authorization temporal information;Judge the authorization Customer name, product batches information, and/or authorization temporal information whether the corresponding informance with the manufacturer of the USB3.1 equipment Match;If it is not, then assert the USB3.1 equipment infringement.
In one embodiment of the invention, the protection identification information of each TS2 training sequence for extracting capture is simultaneously pressed The step of chronological order arranges further include: each protection identification information is decoded using ASCII character;After decoding Each protection identification information in chronological sequence sequentially arrange.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence The soft core of IP encroach right identification method, be applied to usb host, which comprises in Polling.Configuration state And/or under Recovery.Configuration state, is sent in reserve bytes to USB3.1 equipment and carry specific information TS2 training sequence, and check whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert that the USB3.1 is set Standby is not target device;And/or under U0 state, the user's test link pipe for carrying specific information is sent to USB3.1 equipment Data packet is managed, and checks whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert the USB3.1 equipment not It is target device.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence The soft core property right protection device of IP, be applied to USB3.1 equipment, described device includes: mode conversion module, for detecting whether Meet the trigger condition of preset protection recognition mode;If so, current working status is switched to the protection recognition mode; Sequence sending module, under the working condition of the protection recognition mode, and in Polling.Configuration state And/or Recovery.Configuration state sends the TS2 that protection identification information is carried in reserve bytes to usb host Training sequence.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence The soft core of IP encroach right identification apparatus, be applied to usb protocol analytical equipment, described device includes: sequence capturing module, for capturing USB3.1 equipment under the working condition of protection recognition mode, and in Polling.Configuration state and/or Recovery.Configuration state is to TS2 training sequence transmitted by usb host;Information extraction modules, for extracting Protection identification information in the reserve bytes of the TS2 training sequence;Infringement identification module, for judging the protection identification letter Whether breath matches with default protection identification information;If so, assert the USB3.1 equipment infringement.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence The soft core of IP encroach right identification apparatus, be applied to usb host, described device includes: sequence sending module, for It sends and protects to USB3.1 equipment under Polling.Configuration state and/or Recovery.Configuration state It writes down characters and carries the TS2 training sequence of specific information in saving;And/or for being carried under U0 state to the transmission of USB3.1 equipment The user of specific information tests link management data packet;Infringement identification module, for checking whether the USB3.1 equipment enters Protect recognition mode;If it is not, then assert that the USB3.1 equipment is not target device.
In order to achieve the above objects and other related objects, the present invention provides a kind of storage medium, wherein being stored with computer Program when the computer program is by processor load and execution, realizes as above any method.
In order to achieve the above objects and other related objects, the present invention provides a kind of electronic equipment, comprising: communicator, processing Device and memory;Wherein, the communicator is used to establish the communication connection of the electronic equipment and external equipment;The storage Device is for storing computer program;The processor is for computer program described in load and execution, so that the electronic equipment is held Row any method as above.
As described above, the IP soft core property right protection of the invention based on USB3.1 agreement TS2 training sequence and infringement are identified Method is based on USB3.1 agreement, increases embedded protection cognizance code in TS2 training sequence, thus to USB3.1 equipment The soft core of IP carries out effective intellectual property protection.Meanwhile infringement identification technology for the intellectual property protection scheme is provided, When being used in the case where the soft core of IP is without permission or being made into product, can be invaded by trigger protection cognizance code Power identifies and puts to the proof.
Detailed description of the invention
Fig. 1 is shown as the soft nuclear protection side IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention The flow diagram of method.
Fig. 2A is shown as the structural schematic diagram that the user in one embodiment of the invention tests link management data packet.
Fig. 2 B is shown as the USB3.1 in one embodiment of the invention and jumps schematic diagram between the sub- state of Polling.
Fig. 3 is shown as the soft core infringement mirror of IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention Determine the flow diagram of method.
Fig. 4 is shown as the soft core infringement of IP of the TS2 training sequence based on USB3.1 agreement in another embodiment of the present invention The flow diagram of identification method.
Fig. 5 is shown as the soft nuclear protection dress of IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention The module diagram set.
Fig. 6 is shown as the soft core infringement mirror of IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention Determine the module diagram of device.
Fig. 7 is shown as the soft core infringement of IP of the TS2 training sequence based on USB3.1 agreement in another embodiment of the present invention The module diagram of identification apparatus.
Fig. 8 is shown as the structural schematic diagram of the electronic equipment in another embodiment of the present invention.
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from Various modifications or alterations are carried out under spirit of the invention.It should be noted that in the absence of conflict, following embodiment and implementation Feature in example can be combined with each other.
It should be noted that illustrating the basic structure that only the invention is illustrated in a schematic way provided in following embodiment Think, only shown in schema then with related component in the present invention rather than component count, shape and size when according to actual implementation Draw, when actual implementation kenel, quantity and the ratio of each component can arbitrarily change for one kind, and its assembly layout kenel It is likely more complexity.
Refering to fig. 1, the present embodiment provides a kind of soft core property right protection sides IP based on USB3.1 agreement TS2 training sequence Method, for carrying out effective intellectual property protection to the soft core of the IP of USB3.1 equipment (Device).In this, USB3.1 equipment refers to By all devices being connected to USB3.1 interface on usb host (Host), such as common USB flash disk, card reader, mobile hard disk, External CD writer etc..The method is responsible for execution by USB3.1 equipment, specifically comprises the following steps:
S11: the trigger condition for meeting preset protection recognition mode is detected whether.If testing result be it is yes, execute step Rapid S12;Conversely, then keeping current working status constant.
S12: current working status is switched into the protection recognition mode.
S13: under the working condition of the protection recognition mode, and in Polling.Configuration state and/or Recovery.Configuration state carries protection into the reserve bytes of TS2 training sequence transmitted by usb host Identification information.
Step S11~S13 will be made and be explained in detail below.
In the normal mode of operation, USB3.1 equipment will not send protection identification information, only when specific trigger condition After satisfaction, USB3.1 equipment can just enter protection recognition mode, and the insertion protection identification in the TS2 training sequence sent later Information, or the TS2 training sequence for carrying protection identification information in advance is being sent later.That is, in the present invention USB3.1 equipment is sent out the TS2 training sequence for carrying protection identification information, when is embedded into as protection identification information TS2 training sequence, then be not specifically limited, and can be and is embedded into when sending, is also possible to be embedded into before factory.
Two kinds of trigger conditions for entering protection recognition mode are listed below:
1) trigger condition 1 receives reservation transmitted by the usb host in Polling.Configuration state One or a certain number of TS2 training sequences of specific information are carried in byte, and/or, 2) it receives and is in One or one of specific information is carried in reserve bytes transmitted by the usb host of Recovery.Configuration state The TS2 training sequence of fixed number amount.
Trigger condition two receives and carries one or one of specific information transmitted by the usb host in U0 state The user of fixed number amount tests link management data packet.
Meeting above-mentioned trigger condition 1) when, the USB3.1 equipment correspondingly enters Polling.Configuration State, and the TS2 training sequence that protection identification information is carried in reserve bytes is sent to the usb host;It is above-mentioned meeting Trigger condition 2) when, the USB3.1 equipment correspondingly enters Recovery.Configuration state, and to the USB master Machine sends the TS2 training sequence that protection identification information is carried in reserve bytes.
When meeting the trigger condition two, the USB3.1 equipment enters Recovery.Configuration state, And the TS2 training sequence that protection identification information is carried in reserve bytes is sent to the usb host.Fig. 2A illustrates a kind of use The format of link management data packet (Vendor Device Test Link Management Packet), specific letter are tested in family Breath is located in DWORD1 and/or DWORD2, tests link management number when USB3.1 equipment receives the user comprising this specific information After packet, into protection recognition mode, and enter Recovery state.
In trigger condition one and trigger condition two, specific information can be it is preset it is large and small write female, number or Punctuation mark can also be by wherein several character strings etc. being composed.
It is well known that (being inserted into notebook similar to by the USB flash disk of USB3.1 to normal work since powering on link On USB3.1 interface to can normally start read data) need experienced three stages: Rx.Detect, Polling, U0, In, Polling (poll) process the terminal device of chain road can be carried out relevant Initialize installation (namely indicate Host and Device is in initialization transmitting terminal and receiving end and synchronizes to be ready for the transmission of data packet);From Rx.Detect to U0 Process need to undergo several subprocess, wherein just including TS2 training sequence in the sub- state of Polling.Configuration Transmission: both devices are by sending the setting that TS2 training sequence carries out relevant parameter to other side, and in transmitting-receiving to specified number TS2 training sequence after complete to shake hands, into next sub- state Poll.Idle;The initialization of entire link to be done will Into U0 stage (normal operating conditions, chain road have sending and receiving for data packet).In addition to this, USB3.1 communication protocol Regulation, initiator or recipient after there is recoverable error or exits low power consumpting state in link, into working condition Recovery (recovery) state can be entered before, can repeat to send TS2 training sequence in this state, initiator or recipient can To know that it has entered Recovery (recovery) state or has dropped out low-power consumption when receiving the TS2 training sequence of other side's transmission State.
Accept it is above-mentioned, according to USB3.1 agreement, TS2 training sequence can in Polling.Configuration and The sub- state of Recovery.Configuration is sent, and completes to shake hands, Fig. 2 B show USB3.1 the sub- state of Polling it Between jump, wherein Polling.Configuration is the sub- state that USB3.1 enters that working condition has to pass through, thus Insertion retains cognizance code and can effectively IP be protected and be identified in TS2 training sequence.
Table 1 is shown as the format of USB3.1 agreement TS2 training sequence, and the length is 16 bytes, the present embodiment is preferably adopted It uses the 5th sign bit (the symbol number 4 i.e. in table 1) of TS2 training sequence to carry protection as reserve bytes to know Other information.The reason is that: according to USB3.1 agreement, default is set as zero when reserve bytes sender sends, and recipient is upon receipt not It checks, therefore carries protection identification information using No. 4 reserve bytes and will not influence the normal work of USB3.1 equipment.
Table 1
According to the definition of TS2 training sequence, there is the space of a byte that can carry reservation in a TS2 training sequence and know Other information, therefore, in one embodiment, using ASCII (ASCII, American Standard Code for Information Interchange) coding mode, by each byte representation be upper and lower case letter, a number Word or punctuation mark pass through the reserve bytes in continuous TS2 training sequence after USB3.1 equipment enters protection recognition mode Middle insertion identification information completes the label to equipment.So-called make marks to equipment refers to that our USB3.1 equipment enters protection After recognition mode, there is protection identification information in the reserve bytes of TS2 training sequence, and others USB3.1 equipment does not have then There is this function, thus can effectively distinguish our equipment and other equipment.At this point, if some USB3.1 Equipment does not enter into protection recognition mode after meeting trigger condition, then illustrate that the USB3.1 equipment uses be not we IP it is soft The problem of core, also just there is no infringements.
Since a TS2 training sequence can only carry the identification information of a byte, it, will in an embodiment Identification information is inserted into letter-by-letterly and periodicity sending.Protection identification information may include the customer name of IP authorization, authorization The information such as batch and time.For example, authorization client is A, authorization batch is B, and the authorization time is C, then protects the identification information to be ABC.Three TS2 training sequences are sent in one cycle, entrained by the reserve bytes of first TS2 training sequence of transmission Protection identification information is A, and protection identification information entrained by the reserve bytes of second TS2 training sequence of transmission is B, is sent Third TS2 training sequence reserve bytes entrained by protection identification information be C, wherein A~C is located at each TS2 In 5th byte of training sequence, and in the form of ASCII character exist, namely be respectively as follows: 01000001,01000010 and 01000011。
In another embodiment, after step S13, the method also includes: it is re-powering or is receiving by USB master After reset request transmitted by machine, the protection recognition mode is exited.
Refering to Fig. 3, the present embodiment provides a kind of IP based on USB3.1 agreement TS2 training sequence soft core infringement identification sides Method carries out effective infringement identification for the soft core of IP to the USB3.1 equipment in preceding method embodiment.The method is by USB Protocal analysis equipment is responsible for execution, which refers to the electronic equipment with usb protocol analytic function, such as USB Protocol analyzer etc..The method specifically comprises the following steps:
S31: capturing tested USB3.1 equipment under the working condition of protection recognition mode, and Polling.Configuration state and/or Recovery.Configuration state are to TS2 transmitted by usb host Training sequence.
Tested USB3.1 equipment and usb host communicate to connect, and usb protocol analytical equipment records the row on USB3.1 interface For, capture tested USB3.1 equipment in the case where protecting recognition mode, in Polling.Configuration state and/or Recovery.Configuration state is to TS2 training sequence transmitted by usb host.
S32: the protection identification information in the reserve bytes of the TS2 training sequence is extracted.
Obviously, if can assert tested there is no protection identification information in the reserve bytes of the TS2 training sequence of capture Not the problem of USB3.1 equipment is not our equipment, and also just there is no infringements.
S33: judge whether the protection identification information matches with default protection identification information;If so, thening follow the steps S34;Conversely, thening follow the steps S35.
Default protection identification information can be preset large and small write female, number or punctuation mark, can also be by Wherein several character strings etc. being composed.When the protection identification information of extraction matches with default protection identification information, then say The bright USB3.1 equipment is our product.
S34: assert the USB3.1 equipment infringement.
S35: assert that the USB3.1 equipment is not encroached right.
In one embodiment, step S31 continuously captures certain time or a certain number of TS2 training sequences, step S32 are mentioned It is carried out and is decoded using ASCII character after taking the protection identification information in each TS2 training sequence, and will be each after decoding The protection identification information is arranged successively, to restore authorization customer name, product batches information, and/or authorization time letter Breath, step S33 judge the authorization customer name, product batches information, and/or authorize temporal information whether with the USB3.1 The corresponding informance (namely title, product batches, and/or authorization time) of the manufacturer of equipment matches, if mismatching, assert Tested USB3.1 equipment infringement.
IP soft core infringement identification side refering to Fig. 4, the present embodiment provides another kind based on USB3.1 agreement TS2 training sequence Method carries out effective infringement identification for the soft core of IP to the USB3.1 equipment in preceding method embodiment.The method is by USB Host is responsible for execution, the usb host refer to desktop computer that is with USB3.1 interface and being connected and communicated with USB3.1 equipment, The electronic equipments such as laptop.The method specifically comprises the following steps:
S41: under Polling.Configuration state and/or Recovery.Configuration state, to USB3.1 equipment sends the TS2 training sequence that specific information is carried in reserve bytes, and/or, under U0 state, to USB3.1 Equipment sends the user's test link management data packet for carrying specific information.
S42: check whether the USB3.1 equipment enters protection recognition mode;If it is not, thening follow the steps S43;Conversely, then Executable Fig. 3 method as described in the examples, and then judge infringement situation.
S43: assert that the USB3.1 equipment is not target device namely tested USB3.1 equipment is not our product, The problem of there is no infringements.
Similar with embodiment of the method principle shown in Fig. 1 refering to Fig. 5, the present embodiment provides one kind to be based on USB3.1 agreement The soft core property right protection device 500 of the IP of TS2 training sequence, the device are equipped on USB3.1 equipment as software product, to transport The all or part of the steps in embodiment of the method shown in Fig. 1 is realized when row.Specifically, device 500 includes following module:
Mode conversion module 501 is for detecting whether meet the trigger condition of preset protection recognition mode;If so, will Current working status switches to the protection recognition mode;Further, mode conversion module 501 is also used to detecting After USB3.1 equipment re-powers or receive the reset request as transmitted by usb host, the protection recognition mode is exited.
Sequence sending module 502 is used under the working condition of the protection recognition mode, and Polling.Configuration state and/or Recovery.Configuration state send reserve bytes to usb host In carry protection identification information TS2 training sequence;Further, sequence sending module 502 is also used to: periodically being sent The TS2 training sequence of protection information is carried in reserve bytes;Wherein, each protection identification information in the period is temporally first Sequence arrangement forms authorization customer name, product batches information, and/or authorization temporal information afterwards.
Since the specific embodiment of device 500 is similar with the specific embodiment of Fig. 1 method in principle, so in this It is not reinflated to repeat.
Similar with embodiment of the method principle shown in Fig. 3 refering to Fig. 6, the present embodiment provides one kind to be based on USB3.1 agreement The soft core infringement identification apparatus 600 of the IP of TS2 training sequence, the device are equipped on USB3.1 protocal analysis as software product and set It is standby, to realize all or part of the steps in embodiment of the method shown in Fig. 3 at runtime.Specifically, device 600 includes such as lower die Block:
Sequence capturing module 601 is used to capture tested USB3.1 equipment under the working condition of protection recognition mode, and Polling.Configuration state and/or Recovery.Configuration state are to TS2 transmitted by usb host Training sequence;Further, sequence capturing module 601 is also used to: continuous capture certain time or a certain number of TS2 instructions Practice sequence.
Information extraction modules 602 are used to extract the protection identification information in the reserve bytes of the TS2 training sequence;Into one Step ground, information extraction modules 602 are also used to: extracting the protection identification information of each TS2 training sequence of capture, and by each institute Protection identification information is stated in chronological sequence sequentially to arrange to restore authorization customer name, product batches information, and/or authorization time Information;Further, information extraction modules 602 are also used to: being decoded using ASCII character to each protection identification information; Each protection identification information after decoding is in chronological sequence sequentially arranged.
Infringement identification module 603 is for judging whether the protection identification information matches with default protection identification information; If so, assert the USB3.1 equipment infringement;Further, infringement identification module 603 is also used to: if the TS2 trains sequence The protection identification information is not present in the reserve bytes of column, then assert that the USB3.1 equipment is not target device;Alternatively, into One step, infringement identification module 603 is also used to: judging the authorization customer name, product batches information, and/or authorization time Whether information matches with the corresponding informance of the manufacturer of the USB3.1 equipment, if it is not, then assert that the USB3.1 equipment is invaded Power.
Since the specific embodiment of device 600 is similar with the specific embodiment of Fig. 3 method in principle, so in this It is not reinflated to repeat.
Similar with embodiment of the method principle shown in Fig. 4 refering to Fig. 7, the present embodiment provides another kinds to be assisted based on USB3.1 The soft core infringement identification apparatus 700 of IP of TS2 training sequence is discussed, which is equipped on usb host as software product, to run All or part of the steps in embodiment of the method shown in Shi Shixian Fig. 4.Specifically, device 700 includes following module:
Sequence sending module 701 be used in Polling.Configuration state and/or The TS2 training that specific information is carried in reserve bytes is sent under Recovery.Configuration state to USB3.1 equipment Sequence;And/or for the user's test link management data for carrying specific information to be sent to USB3.1 equipment under U0 state Packet.
Infringement identification module 702 is for checking whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert The USB3.1 equipment is not target device;Further, if so, connecting and jumping to the sequence capturing module of device 600 601。
Since the specific embodiment of device 700 is similar with the specific embodiment of Fig. 4 method in principle, so in this It is not reinflated to repeat.
It will be appreciated by those skilled in the art that the division of the modules in Fig. 5~Fig. 7 embodiment is only a kind of logic The division of function can be completely or partially integrated on one or more physical entities in actual implementation.And these modules can be with It is all realized, can also be all realized in the form of hardware by way of processing element calls with software, it can also part mould Block realizes that part of module passes through formal implementation of hardware by way of processing element calls software.For example, mode conversion module 501 can be the processing element individually set up, and also can integrate and realize in some chip, in addition it is also possible to program generation The form of code is stored in memory, and the function of simultaneously execution pattern conversion module 501 is called by some processing element.Other moulds The realization of block is similar therewith.Processing element described here can be a kind of integrated circuit, the processing capacity with signal.In reality During now, each step of the above method or the above modules can pass through the integration logic electricity of the hardware in processor elements The instruction of road or software form is completed.
It will appreciated by the skilled person that realizing that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of computer program is crossed to complete.Based on this understanding, the present invention also provides a kind of computer program product, packets Include one or more computer instructions.When loading on computers and executing the computer program instructions, entirely or partly It generates according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, special purpose computer, meter Calculation machine network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or It is transmitted from a computer readable storage medium to another computer readable storage medium, for example, the computer instruction can be with From a web-site, computer, server or data center by it is wired (such as: coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as: infrared, wireless, microwave) mode is to another web-site, computer, server or data center It is transmitted.The computer readable storage medium can be any usable medium or include one that computer can store The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie Matter, (such as: floppy disk, hard disk, tape), optical medium (such as: DVD) or semiconductor medium are (such as: solid state hard disk Solid State Disk (SSD)) etc..
Referring to Fig. 8, the present embodiment provides a kind of electronic equipment, such as: USB3.1 equipment, usb host, usb protocol analysis Instrument etc. comprising connected by bus 81: communicator 82, processor 83 and memory 84, wherein communicator 82 is for real The information of existing electronic equipment and external equipment is transmitted, and memory 83 is deposited for storing computer program, processor 84 for executing The computer program that reservoir 83 stores, so that the electronic equipment executes the step in aforementioned either method embodiment.
System bus mentioned above can be Peripheral Component Interconnect standard (PeripheralPomponentInterconnect, abbreviation PCI) bus or expanding the industrial standard structure (ExtendedIndu StryStandardArchitecture, abbreviation EISA) bus etc..The system bus can be divided into address bus, data/address bus, Control bus etc..Only to be indicated with a thick line in figure, it is not intended that an only bus or a type of convenient for indicating Bus.Communication interface is for realizing between database access device and other equipment (such as client, read-write library and read-only library) Communication.Memory may include random access memory (RandomAccessMemory, abbreviation RAM), it is also possible to further include Nonvolatile memory (non-volatilememory), for example, at least a magnetic disk storage.
Above-mentioned processor can be general processor, including central processing unit (CentralProcessingUnit, letter Claim CPU), network processing unit (NetworkProcessor, abbreviation NP) etc.;It can also be digital signal processor (DigitalSignalProcessing, abbreviation DSP), specific integrated circuit (ApplicationSpecificIntegrated Circuit, abbreviation ASIC), field programmable gate array (Field-ProgrammableGateArray, abbreviation FPGA) or Other programmable logic device, discrete gate or transistor logic, discrete hardware components.
In conclusion the IP soft core property right protection of the invention based on USB3.1 agreement TS2 training sequence and infringement are identified Method, using with USB3.1 protocol depth binding by the way of, have effectively achieved the intellectual property protection to the soft core of USB3.1 with Identification, effectively overcomes various shortcoming in the prior art and has high industrial utilization value.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as At all equivalent modifications or change, should be covered by the claims of the present invention.

Claims (16)

1. a kind of soft core property right protection method of IP based on USB3.1 agreement TS2 training sequence, which is characterized in that be applied to USB3.1 equipment, which comprises
Detect whether the trigger condition for meeting preset protection recognition mode;
If so, current working status is switched to the protection recognition mode;Wherein,
Under the working condition of the protection recognition mode, and in Polling.Configuration state and/or Recovery.Configuration state carries protection into the reserve bytes of TS2 training sequence transmitted by usb host Identification information.
2. the method according to claim 1, wherein the trigger condition packet of the preset protection recognition mode It includes:
Trigger condition 1) it receives in Polling.Configuration state and/or Recovery.Configuration The TS2 training sequence of specific information is carried in reserve bytes transmitted by the usb host of state;And/or
Trigger condition 2) receive user's test link pipe that specific information is carried transmitted by the usb host in U0 state Manage data packet;Wherein,
Meeting the trigger condition 1) when, the USB3.1 equipment correspondingly enters Polling.Configuration state And/or Recovery.Configuration state, and sent to the usb host and carry protection identification letter in reserve bytes The TS2 training sequence of breath;
Meeting the trigger condition 2) when, the USB3.1 equipment enters Recovery.Configuration state, and to The usb host sends the TS2 training sequence that protection identification information is carried in reserve bytes.
3. the method according to claim 1, wherein it is described in Polling.Configuration state and/or The step of sending TS2 training sequence to usb host under Recovery.Configuration state further include:
Periodically send the TS2 training sequence that protection information is carried in reserve bytes;Wherein,
In chronological sequence sequentially arrangement forms authorization customer name, product batches letter to each protection identification information in period Breath, and/or authorization temporal information.
4. method according to claim 1 or 2, which is characterized in that the reserve bytes are the of the TS2 training sequence Five bytes.
5. the method according to claim 1, wherein the protection identification information uses ASCII character to encode in advance It generates.
6. the method according to claim 1, wherein the method also includes: re-power or receive by After reset request transmitted by usb host, the protection recognition mode is exited.
The identification method 7. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB Protocal analysis equipment, which comprises
Capture USB3.1 equipment in protection recognition mode working condition under, and Polling.Configuration state and/ Or Recovery.Configuration state is to TS2 training sequence transmitted by usb host;
Extract the protection identification information in the reserve bytes of the TS2 training sequence;
Judge whether the protection identification information matches with default protection identification information;
If so, assert the USB3.1 equipment infringement.
8. the method according to the description of claim 7 is characterized in that the method also includes: if the guarantor of the TS2 training sequence Writeeing down characters in saving, there is no the protection identification informations, then assert that the USB3.1 equipment is not target device.
9. the method according to the description of claim 7 is characterized in that the method also includes:
Continuous capture certain time or a certain number of TS2 training sequences;
The protection identification information of each TS2 training sequence of capture is extracted, and each protection identification information is temporally first Sequence arrangement is afterwards to restore authorization customer name, product batches information, and/or authorization temporal information;
Judge the authorization customer name, product batches information, and/or authorization temporal information whether with the USB3.1 equipment The corresponding informance of manufacturer matches;
If it is not, then assert the USB3.1 equipment infringement.
10. according to the method described in claim 8, it is characterized in that, the guarantor of each TS2 training sequence for extracting capture Protect identification information and in chronological sequence tactic step further include:
Each protection identification information is decoded using ASCII character;
Each protection identification information after decoding is in chronological sequence sequentially arranged.
The identification method 11. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB Host, which comprises
Under Polling.Configuration state and/or Recovery.Configuration state, to USB3.1 equipment It sends in reserve bytes and carries the TS2 training sequence of specific information, and check whether the USB3.1 equipment enters protection and know Other mode;If it is not, then assert that the USB3.1 equipment is not target device;And/or
Under U0 state, the user's test link management data packet for carrying specific information is sent to USB3.1 equipment, and check Whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert that the USB3.1 equipment is not target device.
12. a kind of soft core property right protection device of IP based on USB3.1 agreement TS2 training sequence, which is characterized in that be applied to USB3.1 equipment, described device include:
Mode conversion module, for detecting whether meeting the trigger condition of preset protection recognition mode;If so, by current work The protection recognition mode is switched to as state;
Sequence sending module, under the working condition of the protection recognition mode, and in Polling.Configuration State and/or Recovery.Configuration state are sent in reserve bytes to usb host carries protection identification information TS2 training sequence.
The identification apparatus 13. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB Protocal analysis equipment, described device include:
Sequence capturing module, for capturing USB3.1 equipment under the working condition of protection recognition mode, and Polling.Configuration state and/or Recovery.Configuration state are to TS2 transmitted by usb host Training sequence;
Information extraction modules, the protection identification information in reserve bytes for extracting the TS2 training sequence;
Infringement identification module, for judging whether the protection identification information matches with default protection identification information;If so, Assert the USB3.1 equipment infringement.
The identification apparatus 14. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB Host, described device include:
Sequence sending module, in Polling.Configuration state and/or Recovery.Configuration shape The TS2 training sequence that specific information is carried in reserve bytes is sent under state to USB3.1 equipment;And/or under U0 state The user's test link management data packet for carrying specific information is sent to USB3.1 equipment;
Infringement identification module, for checking whether the USB3.1 equipment enters protection recognition mode;If it is not, described in then assert USB3.1 equipment is not target device.
15. a kind of storage medium, wherein being stored with computer program, which is characterized in that the computer program is added by processor When carrying execution, the method as described in any in claim 1 to 11 is realized.
16. a kind of electronic equipment characterized by comprising communicator, processor and memory;Wherein,
The communicator is used to establish the communication connection of the electronic equipment and external equipment;
The memory is for storing computer program;
The processor is for computer program described in load and execution, so that the electronic equipment executes such as claim 1 to 11 In any method.
CN201810651407.9A 2018-06-22 2018-06-22 IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence Active CN109145527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810651407.9A CN109145527B (en) 2018-06-22 2018-06-22 IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810651407.9A CN109145527B (en) 2018-06-22 2018-06-22 IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence

Publications (2)

Publication Number Publication Date
CN109145527A true CN109145527A (en) 2019-01-04
CN109145527B CN109145527B (en) 2020-10-09

Family

ID=64802228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810651407.9A Active CN109145527B (en) 2018-06-22 2018-06-22 IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence

Country Status (1)

Country Link
CN (1) CN109145527B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110018977A (en) * 2019-03-20 2019-07-16 芯启源(上海)半导体科技有限公司 Infringement recognition methods, system, terminal and medium based on usb protocol

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1438593A (en) * 2003-01-15 2003-08-27 西安交通大学 Design method for specific chip of intelligent electric appliance
TWI295133B (en) * 2005-11-04 2008-03-21 Univ Nat Taiwan
US20110113392A1 (en) * 2009-11-09 2011-05-12 Rajat Subhra Chakraborty Protection of intellectual property (ip) cores through a design flow
CN104615952A (en) * 2014-12-22 2015-05-13 天津大学 IP hard core intellectual property protection method and device based on path delay
US20170185477A1 (en) * 2015-12-29 2017-06-29 Arteris, Inc. Protection scheme conversion
CN107679008A (en) * 2017-10-17 2018-02-09 郑州云海信息技术有限公司 A kind of IP kernel for optimizing user interface and the method for optimizing IP user's interface

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1438593A (en) * 2003-01-15 2003-08-27 西安交通大学 Design method for specific chip of intelligent electric appliance
TWI295133B (en) * 2005-11-04 2008-03-21 Univ Nat Taiwan
US20110113392A1 (en) * 2009-11-09 2011-05-12 Rajat Subhra Chakraborty Protection of intellectual property (ip) cores through a design flow
CN104615952A (en) * 2014-12-22 2015-05-13 天津大学 IP hard core intellectual property protection method and device based on path delay
US20170185477A1 (en) * 2015-12-29 2017-06-29 Arteris, Inc. Protection scheme conversion
CN107679008A (en) * 2017-10-17 2018-02-09 郑州云海信息技术有限公司 A kind of IP kernel for optimizing user interface and the method for optimizing IP user's interface

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110018977A (en) * 2019-03-20 2019-07-16 芯启源(上海)半导体科技有限公司 Infringement recognition methods, system, terminal and medium based on usb protocol

Also Published As

Publication number Publication date
CN109145527B (en) 2020-10-09

Similar Documents

Publication Publication Date Title
KR101265116B1 (en) Integrated circuit with self-test feature for validating functionality of external interfaces
CN102033770B (en) Touch screen firmware upgrading method and device for mobile terminal
JP6949843B2 (en) Hardware integrity check
US20180300431A1 (en) Universal verification methodology (uvm) register abstraction layer (ral) traffic predictor
JP2004227588A (en) Sdio card development system
CN104077203A (en) Method and device for diagnosing computer hardware through USB interface
CN104272271B (en) Processor device with instruction trace ability
CN102147831A (en) Logic verification method and device
US20110225559A1 (en) Logic verifying apparatus, logic verifying method, and medium
CN109214144A (en) The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS2 training sequence
US7823133B2 (en) Smart card device and method for debug and software development
CN101114249A (en) I2C bus testing apparatus of mainboard and method thereof
CN109102436A (en) The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS1 training sequence
CN109145527A (en) The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence
CN109165481A (en) The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS2 training sequence
CN109214143A (en) The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS1 training sequence
CN109165482A (en) The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS1 training sequence
CN110018977A (en) Infringement recognition methods, system, terminal and medium based on usb protocol
JP2004362579A (en) Smart card emulator using buffering interface and related method
Gupta et al. UART communication
CN103345610B (en) The Apparatus and method for of fast verification intelligent card data integrality
CN110765038B (en) Communication method and device of processor and LPC device and storage medium
CN112597444B (en) USB equipment IP infringement identification method based on USB protocol and terminal thereof
Goldstein Checking the play in plug-and-play
KR101265233B1 (en) Production and testing the initial storage host bus adapter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant