CN109145527A - The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence - Google Patents
The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence Download PDFInfo
- Publication number
- CN109145527A CN109145527A CN201810651407.9A CN201810651407A CN109145527A CN 109145527 A CN109145527 A CN 109145527A CN 201810651407 A CN201810651407 A CN 201810651407A CN 109145527 A CN109145527 A CN 109145527A
- Authority
- CN
- China
- Prior art keywords
- protection
- equipment
- training sequence
- identification information
- configuration state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012549 training Methods 0.000 title claims abstract description 112
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000011084 recovery Methods 0.000 claims abstract description 37
- 238000013475 authorization Methods 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 13
- 238000012360 testing method Methods 0.000 claims description 13
- 230000002123 temporal effect Effects 0.000 claims description 8
- 238000006243 chemical reaction Methods 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 6
- 238000004458 analytical method Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 5
- 238000013461 design Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000007726 management method Methods 0.000 description 9
- 238000012545 processing Methods 0.000 description 9
- 239000004575 stone Substances 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 4
- 229910052710 silicon Inorganic materials 0.000 description 4
- 239000010703 silicon Substances 0.000 description 4
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000003999 initiator Substances 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Information Transfer Systems (AREA)
Abstract
The present invention provides the soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence; wherein; the soft core property right protection method of IP based on USB3.1 agreement TS2 training sequence is applied to USB3.1 equipment, comprising: detects whether the trigger condition for meeting preset protection recognition mode;If so, current working status is switched to the protection recognition mode;Wherein, under the working condition of the protection recognition mode, and protection identification information is carried into the reserve bytes of TS2 training sequence transmitted by usb host in Polling.Configuration state and/or Recovery.Configuration state.The present invention has effectively achieved the intellectual property protection and identification to the soft core of USB3.1 using with by the way of the binding of USB3.1 protocol depth.
Description
Technical field
The present invention relates to the silicon intellectual property technical fields of USB device, instruct more particularly to the TS2 based on USB3.1 agreement
The soft core of IP of the property right protection method and device and TS2 training sequence based on USB3.1 agreement of the soft core of IP of white silk sequence is invaded
Weigh identification method and device, and corresponding storage medium and electronic equipment.
Background technique
USB is the abbreviation of English Universal Serial Bus (universal serial bus), is a kind of external bus standard,
For being connected and communicate with for specification computer and external equipment.The plug and play and warm connection function of USB interface holding equipment.USB
Standard will be proposed in the end of the year 1994 by Intel, Compaq, IBM, Microsoft Deng Duo company joint, through being widely used
In each class of electronic devices such as computer, mobile phone, digital camera.USB standard is formulated and is safeguarded by USB official organization USB-IF, from opening
Beginning has successively issued USB1.1, USB2.0, USB3.0, USB3.1 and USB3.2 totally five versions, new version forward compatibility so far
Legacy version.The peak transfer rate distribution that each version is supported are as follows: USB1.1:12Mbps;USB2.0:480Mbps;USB3.0:
5Gbps;USB3.1:10Gbps;USB3.2:20Gbps.
Silicon intellectual property (SIP, Silicon Intellectual Property) refers to a kind of thing in chip (IC) industry
First definition, verified module may be reused, that specific function can be completed.With mentioning for chip complexity and integrated level
It rises, processor, memory, the port I/O and analog circuit are all integrated on a silicon wafer, form a complete system on chip
(SOC, System On Chip), if from the beginning each module of SOC product new each time will design and then is again
System integration and verifying certainly will will lead to the extension of development cycle, and the quality designed is also difficult to control.Therefore, it repeats to make
With being pre-designed and authenticated integrated circuit modules (IP) are the most effective solutions of current industry.
It distinguishes, IP can be divided for soft core, solid core, stone three types from design cycle:
1, the soft core of IP (Soft IP)
During logic IC design, IC designer can use hardware description language after the completion of the system specification is formulated
Function needed for system is write out to the program of Method at Register Transfer Level (RTL, Register Transfer Level), this RTL text
Part is thus referred to as the soft core of IP.
Since the soft core of IP is provided in the form of source code, so flexibility with higher, can come real through user's modification
Design of circuit system required for existing, and it is unrelated with concrete implementation technique, but the disadvantage is that independent intellectual property right is not readily available
Protection, especially for standard agreement IP (such as USB3.1), even if encrypting to code, client still can adding the same IP
Close code is duplicate to be used in different SOC projects.
2, IP consolidates core (Firm IP)
RTL program passes through simulating, verifying, after meeting design requirement, designer by electronic design automation tool (EDA),
Corresponding logic gate is chosen from the cell library (Cell Library), RTL file is converted into the form of logic gate be in
Existing netlist (Netlist) file, this net meter file, that is, so-called IP consolidate core.
IP consolidates the compromise that core is IP soft core and IP stone, the high reliablity of its core softer than IP, than the strong flexibility of IP stone,
But the no soft core of image of Buddha IP is the same to carry out logic Modification according to the demand of client.
3, IP stone (Hard IP)
Net meter file is after verifying, and the step of into entity design, the position for first carrying out functional blocks configures design
(Floor Planning), then be laid out with wires design (Place&Routing), finish institute after the layout and wiring of entity
The GDSII file of generation, as IP stone.
The design and craft of IP stone has been completed and can not have been modified, the IP stone that user obtains be only product function without
Product design, thus IP stone design and manufacturer full powers control is carried out to it.Consolidate core, IP relative to the soft core of IP and IP
The intellectual property protection of stone is also fairly simple.
USB3.1IP is a kind of standard IP being widely used, and takes effective measures and carries out intellectual property protection to it and be
Very necessary.However, this field rarely has the research approach for carrying out intellectual property protection to the soft core of the IP of USB3.1 equipment.
Summary of the invention
In view of the foregoing deficiencies of prior art, the purpose of the present invention is to provide based on USB3.1 agreement TS2 training
The soft core property right protection of the IP of sequence and infringement identification method, are difficult in the prior art for solving to the soft core of the IP of USB3.1 equipment
The technical issues of carrying out intellectual property protection.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence
The soft core property right protection method of IP, be applied to USB3.1 equipment, which comprises detect whether to meet preset protection and identify
The trigger condition of mode;If so, current working status is switched to the protection recognition mode;Wherein, know in the protection
Under the working condition of other mode, and in Polling.Configuration state and/or Recovery.Configuration shape
State carries protection identification information into the reserve bytes of TS2 training sequence transmitted by usb host.
In one embodiment of the invention, the trigger condition of the preset protection recognition mode includes: trigger condition 1) it connects
The usb host in Polling.Configuration state and/or Recovery.Configuration state is received to be sent out
The TS2 training sequence of specific information is carried in the reserve bytes sent;And/or trigger condition 2) receive in U0 state
The user that specific information is carried transmitted by usb host tests link management data packet;Wherein, meeting the trigger condition
1) when, the USB3.1 equipment correspondingly enter Polling.Configuration state and/or
Recovery.Configuration state, and sent to the usb host and carry protection identification information in reserve bytes
TS2 training sequence;Meeting the trigger condition 2) when, the USB3.1 equipment enters Recovery.Configuration shape
State, and the TS2 training sequence that protection identification information is carried in reserve bytes is sent to the usb host.
In one embodiment of the invention, it is described in Polling.Configuration state and/or
The step of sending TS2 training sequence to usb host under Recovery.Configuration state further include: periodically send
The TS2 training sequence of protection information is carried in reserve bytes;Wherein, each protection identification information in the period is temporally first
Sequence arrangement forms authorization customer name, product batches information, and/or authorization temporal information afterwards.
In one embodiment of the invention, the reserve bytes are the 5th byte of the TS2 training sequence.
In one embodiment of the invention, the protection identification information uses ASCII character coding to generate in advance.
In one embodiment of the invention, the method also includes: it is re-powering or is receiving as transmitted by usb host
After reset request, the protection recognition mode is exited.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence
The soft core of IP encroach right identification method, be applied to usb protocol analytical equipment, which comprises capture USB3.1 equipment is in protection
Under the working condition of recognition mode, and in Polling.Configuration state and/or Recovery.Configuration
State is to TS2 training sequence transmitted by usb host;Extract the protection identification letter in the reserve bytes of the TS2 training sequence
Breath;Judge whether the protection identification information matches with default protection identification information;If so, assert the USB3.1 equipment
Infringement.
In one embodiment of the invention, the method also includes: if being not present in the reserve bytes of the TS2 training sequence
The protection identification information then assert that the USB3.1 equipment is not target device.
In one embodiment of the invention, the method also includes: continuous capture certain time or a certain number of TS2
Training sequence;The protection identification information of each TS2 training sequence of capture is extracted, and on time by each protection identification information
Between sequencing arrangement with restore authorization customer name, product batches information, and/or authorization temporal information;Judge the authorization
Customer name, product batches information, and/or authorization temporal information whether the corresponding informance with the manufacturer of the USB3.1 equipment
Match;If it is not, then assert the USB3.1 equipment infringement.
In one embodiment of the invention, the protection identification information of each TS2 training sequence for extracting capture is simultaneously pressed
The step of chronological order arranges further include: each protection identification information is decoded using ASCII character;After decoding
Each protection identification information in chronological sequence sequentially arrange.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence
The soft core of IP encroach right identification method, be applied to usb host, which comprises in Polling.Configuration state
And/or under Recovery.Configuration state, is sent in reserve bytes to USB3.1 equipment and carry specific information
TS2 training sequence, and check whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert that the USB3.1 is set
Standby is not target device;And/or under U0 state, the user's test link pipe for carrying specific information is sent to USB3.1 equipment
Data packet is managed, and checks whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert the USB3.1 equipment not
It is target device.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence
The soft core property right protection device of IP, be applied to USB3.1 equipment, described device includes: mode conversion module, for detecting whether
Meet the trigger condition of preset protection recognition mode;If so, current working status is switched to the protection recognition mode;
Sequence sending module, under the working condition of the protection recognition mode, and in Polling.Configuration state
And/or Recovery.Configuration state sends the TS2 that protection identification information is carried in reserve bytes to usb host
Training sequence.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence
The soft core of IP encroach right identification apparatus, be applied to usb protocol analytical equipment, described device includes: sequence capturing module, for capturing
USB3.1 equipment under the working condition of protection recognition mode, and in Polling.Configuration state and/or
Recovery.Configuration state is to TS2 training sequence transmitted by usb host;Information extraction modules, for extracting
Protection identification information in the reserve bytes of the TS2 training sequence;Infringement identification module, for judging the protection identification letter
Whether breath matches with default protection identification information;If so, assert the USB3.1 equipment infringement.
In order to achieve the above objects and other related objects, the present invention provides a kind of based on USB3.1 agreement TS2 training sequence
The soft core of IP encroach right identification apparatus, be applied to usb host, described device includes: sequence sending module, for
It sends and protects to USB3.1 equipment under Polling.Configuration state and/or Recovery.Configuration state
It writes down characters and carries the TS2 training sequence of specific information in saving;And/or for being carried under U0 state to the transmission of USB3.1 equipment
The user of specific information tests link management data packet;Infringement identification module, for checking whether the USB3.1 equipment enters
Protect recognition mode;If it is not, then assert that the USB3.1 equipment is not target device.
In order to achieve the above objects and other related objects, the present invention provides a kind of storage medium, wherein being stored with computer
Program when the computer program is by processor load and execution, realizes as above any method.
In order to achieve the above objects and other related objects, the present invention provides a kind of electronic equipment, comprising: communicator, processing
Device and memory;Wherein, the communicator is used to establish the communication connection of the electronic equipment and external equipment;The storage
Device is for storing computer program;The processor is for computer program described in load and execution, so that the electronic equipment is held
Row any method as above.
As described above, the IP soft core property right protection of the invention based on USB3.1 agreement TS2 training sequence and infringement are identified
Method is based on USB3.1 agreement, increases embedded protection cognizance code in TS2 training sequence, thus to USB3.1 equipment
The soft core of IP carries out effective intellectual property protection.Meanwhile infringement identification technology for the intellectual property protection scheme is provided,
When being used in the case where the soft core of IP is without permission or being made into product, can be invaded by trigger protection cognizance code
Power identifies and puts to the proof.
Detailed description of the invention
Fig. 1 is shown as the soft nuclear protection side IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention
The flow diagram of method.
Fig. 2A is shown as the structural schematic diagram that the user in one embodiment of the invention tests link management data packet.
Fig. 2 B is shown as the USB3.1 in one embodiment of the invention and jumps schematic diagram between the sub- state of Polling.
Fig. 3 is shown as the soft core infringement mirror of IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention
Determine the flow diagram of method.
Fig. 4 is shown as the soft core infringement of IP of the TS2 training sequence based on USB3.1 agreement in another embodiment of the present invention
The flow diagram of identification method.
Fig. 5 is shown as the soft nuclear protection dress of IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention
The module diagram set.
Fig. 6 is shown as the soft core infringement mirror of IP of the TS2 training sequence based on USB3.1 agreement in one embodiment of the invention
Determine the module diagram of device.
Fig. 7 is shown as the soft core infringement of IP of the TS2 training sequence based on USB3.1 agreement in another embodiment of the present invention
The module diagram of identification apparatus.
Fig. 8 is shown as the structural schematic diagram of the electronic equipment in another embodiment of the present invention.
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification
Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities
The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from
Various modifications or alterations are carried out under spirit of the invention.It should be noted that in the absence of conflict, following embodiment and implementation
Feature in example can be combined with each other.
It should be noted that illustrating the basic structure that only the invention is illustrated in a schematic way provided in following embodiment
Think, only shown in schema then with related component in the present invention rather than component count, shape and size when according to actual implementation
Draw, when actual implementation kenel, quantity and the ratio of each component can arbitrarily change for one kind, and its assembly layout kenel
It is likely more complexity.
Refering to fig. 1, the present embodiment provides a kind of soft core property right protection sides IP based on USB3.1 agreement TS2 training sequence
Method, for carrying out effective intellectual property protection to the soft core of the IP of USB3.1 equipment (Device).In this, USB3.1 equipment refers to
By all devices being connected to USB3.1 interface on usb host (Host), such as common USB flash disk, card reader, mobile hard disk,
External CD writer etc..The method is responsible for execution by USB3.1 equipment, specifically comprises the following steps:
S11: the trigger condition for meeting preset protection recognition mode is detected whether.If testing result be it is yes, execute step
Rapid S12;Conversely, then keeping current working status constant.
S12: current working status is switched into the protection recognition mode.
S13: under the working condition of the protection recognition mode, and in Polling.Configuration state and/or
Recovery.Configuration state carries protection into the reserve bytes of TS2 training sequence transmitted by usb host
Identification information.
Step S11~S13 will be made and be explained in detail below.
In the normal mode of operation, USB3.1 equipment will not send protection identification information, only when specific trigger condition
After satisfaction, USB3.1 equipment can just enter protection recognition mode, and the insertion protection identification in the TS2 training sequence sent later
Information, or the TS2 training sequence for carrying protection identification information in advance is being sent later.That is, in the present invention
USB3.1 equipment is sent out the TS2 training sequence for carrying protection identification information, when is embedded into as protection identification information
TS2 training sequence, then be not specifically limited, and can be and is embedded into when sending, is also possible to be embedded into before factory.
Two kinds of trigger conditions for entering protection recognition mode are listed below:
1) trigger condition 1 receives reservation transmitted by the usb host in Polling.Configuration state
One or a certain number of TS2 training sequences of specific information are carried in byte, and/or, 2) it receives and is in
One or one of specific information is carried in reserve bytes transmitted by the usb host of Recovery.Configuration state
The TS2 training sequence of fixed number amount.
Trigger condition two receives and carries one or one of specific information transmitted by the usb host in U0 state
The user of fixed number amount tests link management data packet.
Meeting above-mentioned trigger condition 1) when, the USB3.1 equipment correspondingly enters Polling.Configuration
State, and the TS2 training sequence that protection identification information is carried in reserve bytes is sent to the usb host;It is above-mentioned meeting
Trigger condition 2) when, the USB3.1 equipment correspondingly enters Recovery.Configuration state, and to the USB master
Machine sends the TS2 training sequence that protection identification information is carried in reserve bytes.
When meeting the trigger condition two, the USB3.1 equipment enters Recovery.Configuration state,
And the TS2 training sequence that protection identification information is carried in reserve bytes is sent to the usb host.Fig. 2A illustrates a kind of use
The format of link management data packet (Vendor Device Test Link Management Packet), specific letter are tested in family
Breath is located in DWORD1 and/or DWORD2, tests link management number when USB3.1 equipment receives the user comprising this specific information
After packet, into protection recognition mode, and enter Recovery state.
In trigger condition one and trigger condition two, specific information can be it is preset it is large and small write female, number or
Punctuation mark can also be by wherein several character strings etc. being composed.
It is well known that (being inserted into notebook similar to by the USB flash disk of USB3.1 to normal work since powering on link
On USB3.1 interface to can normally start read data) need experienced three stages: Rx.Detect, Polling, U0,
In, Polling (poll) process the terminal device of chain road can be carried out relevant Initialize installation (namely indicate Host and
Device is in initialization transmitting terminal and receiving end and synchronizes to be ready for the transmission of data packet);From Rx.Detect to U0
Process need to undergo several subprocess, wherein just including TS2 training sequence in the sub- state of Polling.Configuration
Transmission: both devices are by sending the setting that TS2 training sequence carries out relevant parameter to other side, and in transmitting-receiving to specified number
TS2 training sequence after complete to shake hands, into next sub- state Poll.Idle;The initialization of entire link to be done will
Into U0 stage (normal operating conditions, chain road have sending and receiving for data packet).In addition to this, USB3.1 communication protocol
Regulation, initiator or recipient after there is recoverable error or exits low power consumpting state in link, into working condition
Recovery (recovery) state can be entered before, can repeat to send TS2 training sequence in this state, initiator or recipient can
To know that it has entered Recovery (recovery) state or has dropped out low-power consumption when receiving the TS2 training sequence of other side's transmission
State.
Accept it is above-mentioned, according to USB3.1 agreement, TS2 training sequence can in Polling.Configuration and
The sub- state of Recovery.Configuration is sent, and completes to shake hands, Fig. 2 B show USB3.1 the sub- state of Polling it
Between jump, wherein Polling.Configuration is the sub- state that USB3.1 enters that working condition has to pass through, thus
Insertion retains cognizance code and can effectively IP be protected and be identified in TS2 training sequence.
Table 1 is shown as the format of USB3.1 agreement TS2 training sequence, and the length is 16 bytes, the present embodiment is preferably adopted
It uses the 5th sign bit (the symbol number 4 i.e. in table 1) of TS2 training sequence to carry protection as reserve bytes to know
Other information.The reason is that: according to USB3.1 agreement, default is set as zero when reserve bytes sender sends, and recipient is upon receipt not
It checks, therefore carries protection identification information using No. 4 reserve bytes and will not influence the normal work of USB3.1 equipment.
Table 1
According to the definition of TS2 training sequence, there is the space of a byte that can carry reservation in a TS2 training sequence and know
Other information, therefore, in one embodiment, using ASCII (ASCII, American Standard
Code for Information Interchange) coding mode, by each byte representation be upper and lower case letter, a number
Word or punctuation mark pass through the reserve bytes in continuous TS2 training sequence after USB3.1 equipment enters protection recognition mode
Middle insertion identification information completes the label to equipment.So-called make marks to equipment refers to that our USB3.1 equipment enters protection
After recognition mode, there is protection identification information in the reserve bytes of TS2 training sequence, and others USB3.1 equipment does not have then
There is this function, thus can effectively distinguish our equipment and other equipment.At this point, if some USB3.1
Equipment does not enter into protection recognition mode after meeting trigger condition, then illustrate that the USB3.1 equipment uses be not we IP it is soft
The problem of core, also just there is no infringements.
Since a TS2 training sequence can only carry the identification information of a byte, it, will in an embodiment
Identification information is inserted into letter-by-letterly and periodicity sending.Protection identification information may include the customer name of IP authorization, authorization
The information such as batch and time.For example, authorization client is A, authorization batch is B, and the authorization time is C, then protects the identification information to be
ABC.Three TS2 training sequences are sent in one cycle, entrained by the reserve bytes of first TS2 training sequence of transmission
Protection identification information is A, and protection identification information entrained by the reserve bytes of second TS2 training sequence of transmission is B, is sent
Third TS2 training sequence reserve bytes entrained by protection identification information be C, wherein A~C is located at each TS2
In 5th byte of training sequence, and in the form of ASCII character exist, namely be respectively as follows: 01000001,01000010 and
01000011。
In another embodiment, after step S13, the method also includes: it is re-powering or is receiving by USB master
After reset request transmitted by machine, the protection recognition mode is exited.
Refering to Fig. 3, the present embodiment provides a kind of IP based on USB3.1 agreement TS2 training sequence soft core infringement identification sides
Method carries out effective infringement identification for the soft core of IP to the USB3.1 equipment in preceding method embodiment.The method is by USB
Protocal analysis equipment is responsible for execution, which refers to the electronic equipment with usb protocol analytic function, such as USB
Protocol analyzer etc..The method specifically comprises the following steps:
S31: capturing tested USB3.1 equipment under the working condition of protection recognition mode, and
Polling.Configuration state and/or Recovery.Configuration state are to TS2 transmitted by usb host
Training sequence.
Tested USB3.1 equipment and usb host communicate to connect, and usb protocol analytical equipment records the row on USB3.1 interface
For, capture tested USB3.1 equipment in the case where protecting recognition mode, in Polling.Configuration state and/or
Recovery.Configuration state is to TS2 training sequence transmitted by usb host.
S32: the protection identification information in the reserve bytes of the TS2 training sequence is extracted.
Obviously, if can assert tested there is no protection identification information in the reserve bytes of the TS2 training sequence of capture
Not the problem of USB3.1 equipment is not our equipment, and also just there is no infringements.
S33: judge whether the protection identification information matches with default protection identification information;If so, thening follow the steps
S34;Conversely, thening follow the steps S35.
Default protection identification information can be preset large and small write female, number or punctuation mark, can also be by
Wherein several character strings etc. being composed.When the protection identification information of extraction matches with default protection identification information, then say
The bright USB3.1 equipment is our product.
S34: assert the USB3.1 equipment infringement.
S35: assert that the USB3.1 equipment is not encroached right.
In one embodiment, step S31 continuously captures certain time or a certain number of TS2 training sequences, step S32 are mentioned
It is carried out and is decoded using ASCII character after taking the protection identification information in each TS2 training sequence, and will be each after decoding
The protection identification information is arranged successively, to restore authorization customer name, product batches information, and/or authorization time letter
Breath, step S33 judge the authorization customer name, product batches information, and/or authorize temporal information whether with the USB3.1
The corresponding informance (namely title, product batches, and/or authorization time) of the manufacturer of equipment matches, if mismatching, assert
Tested USB3.1 equipment infringement.
IP soft core infringement identification side refering to Fig. 4, the present embodiment provides another kind based on USB3.1 agreement TS2 training sequence
Method carries out effective infringement identification for the soft core of IP to the USB3.1 equipment in preceding method embodiment.The method is by USB
Host is responsible for execution, the usb host refer to desktop computer that is with USB3.1 interface and being connected and communicated with USB3.1 equipment,
The electronic equipments such as laptop.The method specifically comprises the following steps:
S41: under Polling.Configuration state and/or Recovery.Configuration state, to
USB3.1 equipment sends the TS2 training sequence that specific information is carried in reserve bytes, and/or, under U0 state, to USB3.1
Equipment sends the user's test link management data packet for carrying specific information.
S42: check whether the USB3.1 equipment enters protection recognition mode;If it is not, thening follow the steps S43;Conversely, then
Executable Fig. 3 method as described in the examples, and then judge infringement situation.
S43: assert that the USB3.1 equipment is not target device namely tested USB3.1 equipment is not our product,
The problem of there is no infringements.
Similar with embodiment of the method principle shown in Fig. 1 refering to Fig. 5, the present embodiment provides one kind to be based on USB3.1 agreement
The soft core property right protection device 500 of the IP of TS2 training sequence, the device are equipped on USB3.1 equipment as software product, to transport
The all or part of the steps in embodiment of the method shown in Fig. 1 is realized when row.Specifically, device 500 includes following module:
Mode conversion module 501 is for detecting whether meet the trigger condition of preset protection recognition mode;If so, will
Current working status switches to the protection recognition mode;Further, mode conversion module 501 is also used to detecting
After USB3.1 equipment re-powers or receive the reset request as transmitted by usb host, the protection recognition mode is exited.
Sequence sending module 502 is used under the working condition of the protection recognition mode, and
Polling.Configuration state and/or Recovery.Configuration state send reserve bytes to usb host
In carry protection identification information TS2 training sequence;Further, sequence sending module 502 is also used to: periodically being sent
The TS2 training sequence of protection information is carried in reserve bytes;Wherein, each protection identification information in the period is temporally first
Sequence arrangement forms authorization customer name, product batches information, and/or authorization temporal information afterwards.
Since the specific embodiment of device 500 is similar with the specific embodiment of Fig. 1 method in principle, so in this
It is not reinflated to repeat.
Similar with embodiment of the method principle shown in Fig. 3 refering to Fig. 6, the present embodiment provides one kind to be based on USB3.1 agreement
The soft core infringement identification apparatus 600 of the IP of TS2 training sequence, the device are equipped on USB3.1 protocal analysis as software product and set
It is standby, to realize all or part of the steps in embodiment of the method shown in Fig. 3 at runtime.Specifically, device 600 includes such as lower die
Block:
Sequence capturing module 601 is used to capture tested USB3.1 equipment under the working condition of protection recognition mode, and
Polling.Configuration state and/or Recovery.Configuration state are to TS2 transmitted by usb host
Training sequence;Further, sequence capturing module 601 is also used to: continuous capture certain time or a certain number of TS2 instructions
Practice sequence.
Information extraction modules 602 are used to extract the protection identification information in the reserve bytes of the TS2 training sequence;Into one
Step ground, information extraction modules 602 are also used to: extracting the protection identification information of each TS2 training sequence of capture, and by each institute
Protection identification information is stated in chronological sequence sequentially to arrange to restore authorization customer name, product batches information, and/or authorization time
Information;Further, information extraction modules 602 are also used to: being decoded using ASCII character to each protection identification information;
Each protection identification information after decoding is in chronological sequence sequentially arranged.
Infringement identification module 603 is for judging whether the protection identification information matches with default protection identification information;
If so, assert the USB3.1 equipment infringement;Further, infringement identification module 603 is also used to: if the TS2 trains sequence
The protection identification information is not present in the reserve bytes of column, then assert that the USB3.1 equipment is not target device;Alternatively, into
One step, infringement identification module 603 is also used to: judging the authorization customer name, product batches information, and/or authorization time
Whether information matches with the corresponding informance of the manufacturer of the USB3.1 equipment, if it is not, then assert that the USB3.1 equipment is invaded
Power.
Since the specific embodiment of device 600 is similar with the specific embodiment of Fig. 3 method in principle, so in this
It is not reinflated to repeat.
Similar with embodiment of the method principle shown in Fig. 4 refering to Fig. 7, the present embodiment provides another kinds to be assisted based on USB3.1
The soft core infringement identification apparatus 700 of IP of TS2 training sequence is discussed, which is equipped on usb host as software product, to run
All or part of the steps in embodiment of the method shown in Shi Shixian Fig. 4.Specifically, device 700 includes following module:
Sequence sending module 701 be used in Polling.Configuration state and/or
The TS2 training that specific information is carried in reserve bytes is sent under Recovery.Configuration state to USB3.1 equipment
Sequence;And/or for the user's test link management data for carrying specific information to be sent to USB3.1 equipment under U0 state
Packet.
Infringement identification module 702 is for checking whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert
The USB3.1 equipment is not target device;Further, if so, connecting and jumping to the sequence capturing module of device 600
601。
Since the specific embodiment of device 700 is similar with the specific embodiment of Fig. 4 method in principle, so in this
It is not reinflated to repeat.
It will be appreciated by those skilled in the art that the division of the modules in Fig. 5~Fig. 7 embodiment is only a kind of logic
The division of function can be completely or partially integrated on one or more physical entities in actual implementation.And these modules can be with
It is all realized, can also be all realized in the form of hardware by way of processing element calls with software, it can also part mould
Block realizes that part of module passes through formal implementation of hardware by way of processing element calls software.For example, mode conversion module
501 can be the processing element individually set up, and also can integrate and realize in some chip, in addition it is also possible to program generation
The form of code is stored in memory, and the function of simultaneously execution pattern conversion module 501 is called by some processing element.Other moulds
The realization of block is similar therewith.Processing element described here can be a kind of integrated circuit, the processing capacity with signal.In reality
During now, each step of the above method or the above modules can pass through the integration logic electricity of the hardware in processor elements
The instruction of road or software form is completed.
It will appreciated by the skilled person that realizing that all or part of the steps of above-mentioned each method embodiment can lead to
The relevant hardware of computer program is crossed to complete.Based on this understanding, the present invention also provides a kind of computer program product, packets
Include one or more computer instructions.When loading on computers and executing the computer program instructions, entirely or partly
It generates according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, special purpose computer, meter
Calculation machine network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or
It is transmitted from a computer readable storage medium to another computer readable storage medium, for example, the computer instruction can be with
From a web-site, computer, server or data center by it is wired (such as: coaxial cable, optical fiber, Digital Subscriber Line
(DSL)) or wireless (such as: infrared, wireless, microwave) mode is to another web-site, computer, server or data center
It is transmitted.The computer readable storage medium can be any usable medium or include one that computer can store
The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie
Matter, (such as: floppy disk, hard disk, tape), optical medium (such as: DVD) or semiconductor medium are (such as: solid state hard disk Solid State
Disk (SSD)) etc..
Referring to Fig. 8, the present embodiment provides a kind of electronic equipment, such as: USB3.1 equipment, usb host, usb protocol analysis
Instrument etc. comprising connected by bus 81: communicator 82, processor 83 and memory 84, wherein communicator 82 is for real
The information of existing electronic equipment and external equipment is transmitted, and memory 83 is deposited for storing computer program, processor 84 for executing
The computer program that reservoir 83 stores, so that the electronic equipment executes the step in aforementioned either method embodiment.
System bus mentioned above can be Peripheral Component Interconnect standard
(PeripheralPomponentInterconnect, abbreviation PCI) bus or expanding the industrial standard structure (ExtendedIndu
StryStandardArchitecture, abbreviation EISA) bus etc..The system bus can be divided into address bus, data/address bus,
Control bus etc..Only to be indicated with a thick line in figure, it is not intended that an only bus or a type of convenient for indicating
Bus.Communication interface is for realizing between database access device and other equipment (such as client, read-write library and read-only library)
Communication.Memory may include random access memory (RandomAccessMemory, abbreviation RAM), it is also possible to further include
Nonvolatile memory (non-volatilememory), for example, at least a magnetic disk storage.
Above-mentioned processor can be general processor, including central processing unit (CentralProcessingUnit, letter
Claim CPU), network processing unit (NetworkProcessor, abbreviation NP) etc.;It can also be digital signal processor
(DigitalSignalProcessing, abbreviation DSP), specific integrated circuit (ApplicationSpecificIntegrated
Circuit, abbreviation ASIC), field programmable gate array (Field-ProgrammableGateArray, abbreviation FPGA) or
Other programmable logic device, discrete gate or transistor logic, discrete hardware components.
In conclusion the IP soft core property right protection of the invention based on USB3.1 agreement TS2 training sequence and infringement are identified
Method, using with USB3.1 protocol depth binding by the way of, have effectively achieved the intellectual property protection to the soft core of USB3.1 with
Identification, effectively overcomes various shortcoming in the prior art and has high industrial utilization value.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe
The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause
This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as
At all equivalent modifications or change, should be covered by the claims of the present invention.
Claims (16)
1. a kind of soft core property right protection method of IP based on USB3.1 agreement TS2 training sequence, which is characterized in that be applied to
USB3.1 equipment, which comprises
Detect whether the trigger condition for meeting preset protection recognition mode;
If so, current working status is switched to the protection recognition mode;Wherein,
Under the working condition of the protection recognition mode, and in Polling.Configuration state and/or
Recovery.Configuration state carries protection into the reserve bytes of TS2 training sequence transmitted by usb host
Identification information.
2. the method according to claim 1, wherein the trigger condition packet of the preset protection recognition mode
It includes:
Trigger condition 1) it receives in Polling.Configuration state and/or Recovery.Configuration
The TS2 training sequence of specific information is carried in reserve bytes transmitted by the usb host of state;And/or
Trigger condition 2) receive user's test link pipe that specific information is carried transmitted by the usb host in U0 state
Manage data packet;Wherein,
Meeting the trigger condition 1) when, the USB3.1 equipment correspondingly enters Polling.Configuration state
And/or Recovery.Configuration state, and sent to the usb host and carry protection identification letter in reserve bytes
The TS2 training sequence of breath;
Meeting the trigger condition 2) when, the USB3.1 equipment enters Recovery.Configuration state, and to
The usb host sends the TS2 training sequence that protection identification information is carried in reserve bytes.
3. the method according to claim 1, wherein it is described in Polling.Configuration state and/or
The step of sending TS2 training sequence to usb host under Recovery.Configuration state further include:
Periodically send the TS2 training sequence that protection information is carried in reserve bytes;Wherein,
In chronological sequence sequentially arrangement forms authorization customer name, product batches letter to each protection identification information in period
Breath, and/or authorization temporal information.
4. method according to claim 1 or 2, which is characterized in that the reserve bytes are the of the TS2 training sequence
Five bytes.
5. the method according to claim 1, wherein the protection identification information uses ASCII character to encode in advance
It generates.
6. the method according to claim 1, wherein the method also includes: re-power or receive by
After reset request transmitted by usb host, the protection recognition mode is exited.
The identification method 7. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB
Protocal analysis equipment, which comprises
Capture USB3.1 equipment in protection recognition mode working condition under, and Polling.Configuration state and/
Or Recovery.Configuration state is to TS2 training sequence transmitted by usb host;
Extract the protection identification information in the reserve bytes of the TS2 training sequence;
Judge whether the protection identification information matches with default protection identification information;
If so, assert the USB3.1 equipment infringement.
8. the method according to the description of claim 7 is characterized in that the method also includes: if the guarantor of the TS2 training sequence
Writeeing down characters in saving, there is no the protection identification informations, then assert that the USB3.1 equipment is not target device.
9. the method according to the description of claim 7 is characterized in that the method also includes:
Continuous capture certain time or a certain number of TS2 training sequences;
The protection identification information of each TS2 training sequence of capture is extracted, and each protection identification information is temporally first
Sequence arrangement is afterwards to restore authorization customer name, product batches information, and/or authorization temporal information;
Judge the authorization customer name, product batches information, and/or authorization temporal information whether with the USB3.1 equipment
The corresponding informance of manufacturer matches;
If it is not, then assert the USB3.1 equipment infringement.
10. according to the method described in claim 8, it is characterized in that, the guarantor of each TS2 training sequence for extracting capture
Protect identification information and in chronological sequence tactic step further include:
Each protection identification information is decoded using ASCII character;
Each protection identification information after decoding is in chronological sequence sequentially arranged.
The identification method 11. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB
Host, which comprises
Under Polling.Configuration state and/or Recovery.Configuration state, to USB3.1 equipment
It sends in reserve bytes and carries the TS2 training sequence of specific information, and check whether the USB3.1 equipment enters protection and know
Other mode;If it is not, then assert that the USB3.1 equipment is not target device;And/or
Under U0 state, the user's test link management data packet for carrying specific information is sent to USB3.1 equipment, and check
Whether the USB3.1 equipment enters protection recognition mode;If it is not, then assert that the USB3.1 equipment is not target device.
12. a kind of soft core property right protection device of IP based on USB3.1 agreement TS2 training sequence, which is characterized in that be applied to
USB3.1 equipment, described device include:
Mode conversion module, for detecting whether meeting the trigger condition of preset protection recognition mode;If so, by current work
The protection recognition mode is switched to as state;
Sequence sending module, under the working condition of the protection recognition mode, and in Polling.Configuration
State and/or Recovery.Configuration state are sent in reserve bytes to usb host carries protection identification information
TS2 training sequence.
The identification apparatus 13. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB
Protocal analysis equipment, described device include:
Sequence capturing module, for capturing USB3.1 equipment under the working condition of protection recognition mode, and
Polling.Configuration state and/or Recovery.Configuration state are to TS2 transmitted by usb host
Training sequence;
Information extraction modules, the protection identification information in reserve bytes for extracting the TS2 training sequence;
Infringement identification module, for judging whether the protection identification information matches with default protection identification information;If so,
Assert the USB3.1 equipment infringement.
The identification apparatus 14. a kind of soft core of IP based on USB3.1 agreement TS2 training sequence is encroached right, which is characterized in that be applied to USB
Host, described device include:
Sequence sending module, in Polling.Configuration state and/or Recovery.Configuration shape
The TS2 training sequence that specific information is carried in reserve bytes is sent under state to USB3.1 equipment;And/or under U0 state
The user's test link management data packet for carrying specific information is sent to USB3.1 equipment;
Infringement identification module, for checking whether the USB3.1 equipment enters protection recognition mode;If it is not, described in then assert
USB3.1 equipment is not target device.
15. a kind of storage medium, wherein being stored with computer program, which is characterized in that the computer program is added by processor
When carrying execution, the method as described in any in claim 1 to 11 is realized.
16. a kind of electronic equipment characterized by comprising communicator, processor and memory;Wherein,
The communicator is used to establish the communication connection of the electronic equipment and external equipment;
The memory is for storing computer program;
The processor is for computer program described in load and execution, so that the electronic equipment executes such as claim 1 to 11
In any method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810651407.9A CN109145527B (en) | 2018-06-22 | 2018-06-22 | IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810651407.9A CN109145527B (en) | 2018-06-22 | 2018-06-22 | IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109145527A true CN109145527A (en) | 2019-01-04 |
CN109145527B CN109145527B (en) | 2020-10-09 |
Family
ID=64802228
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810651407.9A Active CN109145527B (en) | 2018-06-22 | 2018-06-22 | IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109145527B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110018977A (en) * | 2019-03-20 | 2019-07-16 | 芯启源(上海)半导体科技有限公司 | Infringement recognition methods, system, terminal and medium based on usb protocol |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1438593A (en) * | 2003-01-15 | 2003-08-27 | 西安交通大学 | Design method for specific chip of intelligent electric appliance |
TWI295133B (en) * | 2005-11-04 | 2008-03-21 | Univ Nat Taiwan | |
US20110113392A1 (en) * | 2009-11-09 | 2011-05-12 | Rajat Subhra Chakraborty | Protection of intellectual property (ip) cores through a design flow |
CN104615952A (en) * | 2014-12-22 | 2015-05-13 | 天津大学 | IP hard core intellectual property protection method and device based on path delay |
US20170185477A1 (en) * | 2015-12-29 | 2017-06-29 | Arteris, Inc. | Protection scheme conversion |
CN107679008A (en) * | 2017-10-17 | 2018-02-09 | 郑州云海信息技术有限公司 | A kind of IP kernel for optimizing user interface and the method for optimizing IP user's interface |
-
2018
- 2018-06-22 CN CN201810651407.9A patent/CN109145527B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1438593A (en) * | 2003-01-15 | 2003-08-27 | 西安交通大学 | Design method for specific chip of intelligent electric appliance |
TWI295133B (en) * | 2005-11-04 | 2008-03-21 | Univ Nat Taiwan | |
US20110113392A1 (en) * | 2009-11-09 | 2011-05-12 | Rajat Subhra Chakraborty | Protection of intellectual property (ip) cores through a design flow |
CN104615952A (en) * | 2014-12-22 | 2015-05-13 | 天津大学 | IP hard core intellectual property protection method and device based on path delay |
US20170185477A1 (en) * | 2015-12-29 | 2017-06-29 | Arteris, Inc. | Protection scheme conversion |
CN107679008A (en) * | 2017-10-17 | 2018-02-09 | 郑州云海信息技术有限公司 | A kind of IP kernel for optimizing user interface and the method for optimizing IP user's interface |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110018977A (en) * | 2019-03-20 | 2019-07-16 | 芯启源(上海)半导体科技有限公司 | Infringement recognition methods, system, terminal and medium based on usb protocol |
Also Published As
Publication number | Publication date |
---|---|
CN109145527B (en) | 2020-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101265116B1 (en) | Integrated circuit with self-test feature for validating functionality of external interfaces | |
CN102033770B (en) | Touch screen firmware upgrading method and device for mobile terminal | |
JP6949843B2 (en) | Hardware integrity check | |
US20180300431A1 (en) | Universal verification methodology (uvm) register abstraction layer (ral) traffic predictor | |
JP2004227588A (en) | Sdio card development system | |
CN104077203A (en) | Method and device for diagnosing computer hardware through USB interface | |
CN104272271B (en) | Processor device with instruction trace ability | |
CN102147831A (en) | Logic verification method and device | |
US20110225559A1 (en) | Logic verifying apparatus, logic verifying method, and medium | |
CN109214144A (en) | The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS2 training sequence | |
US7823133B2 (en) | Smart card device and method for debug and software development | |
CN101114249A (en) | I2C bus testing apparatus of mainboard and method thereof | |
CN109102436A (en) | The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS1 training sequence | |
CN109145527A (en) | The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence | |
CN109165481A (en) | The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS2 training sequence | |
CN109214143A (en) | The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS1 training sequence | |
CN109165482A (en) | The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS1 training sequence | |
CN110018977A (en) | Infringement recognition methods, system, terminal and medium based on usb protocol | |
JP2004362579A (en) | Smart card emulator using buffering interface and related method | |
Gupta et al. | UART communication | |
CN103345610B (en) | The Apparatus and method for of fast verification intelligent card data integrality | |
CN110765038B (en) | Communication method and device of processor and LPC device and storage medium | |
CN112597444B (en) | USB equipment IP infringement identification method based on USB protocol and terminal thereof | |
Goldstein | Checking the play in plug-and-play | |
KR101265233B1 (en) | Production and testing the initial storage host bus adapter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |