CN110018977A - Infringement recognition methods, system, terminal and medium based on usb protocol - Google Patents

Infringement recognition methods, system, terminal and medium based on usb protocol Download PDF

Info

Publication number
CN110018977A
CN110018977A CN201910211819.5A CN201910211819A CN110018977A CN 110018977 A CN110018977 A CN 110018977A CN 201910211819 A CN201910211819 A CN 201910211819A CN 110018977 A CN110018977 A CN 110018977A
Authority
CN
China
Prior art keywords
usb
infringement
recognition methods
trigger signal
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910211819.5A
Other languages
Chinese (zh)
Inventor
范凯
卢笙
韩朝辉
肖骁
王向韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd
Original Assignee
Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd filed Critical Xin Qiyuan (shanghai) Semiconductor Technology Co Ltd
Priority to CN201910211819.5A priority Critical patent/CN110018977A/en
Publication of CN110018977A publication Critical patent/CN110018977A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Abstract

The present invention provides infringement recognition methods, system, terminal and medium based on usb protocol; the scheme for protecting cognizance code is inserted into Isochronous Timestamp Packets (ITP) the invention proposes one kind; using and USB3.0 protocol depth binding by the way of; intellectual property protection effectively is carried out to the soft core of usb host; when being used in the case that soft core is without permission and be made product; it can be triggered by sending specific sequence by specific equipment into protection recognition mode, carry out soft core infringement identification accordingly.Compared to traditional soft core infringement identification mode, the present invention is easier to protection independent intellectual property right, has higher infringement protection reliability;Compared to solid core infringement identification mode, the present invention also has higher flexibility while taking into account reliability;And compared to stone infringement identification mode, the present invention has higher flexibility.

Description

Infringement recognition methods, system, terminal and medium based on usb protocol
Technical field
The present invention relates to USB technical field, more particularly to based on usb protocol infringement recognition methods, system, terminal, And medium.
Background technique
Silicon intellectual property (SIP, Silicon Intellectual Property) refers to one in chip (IC) industry Kind of predefined, it is verified to may be reused, the module of specific function can be completed.
With the promotion of chip complexity and integrated level, processor, memory, the port I/O and analog circuit are all integrated in On one silicon wafer, a complete system on chip (SOC, System On Chip) is formed.If SOC product new each time is every Then a module requires from the beginning to design carries out system combination and verifying again, certainly will will lead to the extension of development cycle, and design Quality be also difficult to control.Therefore, reuse is pre-designed and authenticated integrated circuit modules (IP) become current industry Most effective solution.
It is distinguished from design cycle, integrated circuit modules (IP) can be divided into soft core, solid core, stone three types.
About soft core (Soft IP): during logic IC design, IC designer can formulate in the system specification and complete Afterwards, function needed for system is write out into Method at Register Transfer Level (RTL, Register Transfer using hardware description language Level program), this RTL file are thus referred to as soft core.Soft core is provided in the form of source code, therefore with higher flexible Property, it can be modified through user to realize required design of circuit system, and unrelated with concrete implementation technique.But the shortcomings that soft core It is that independent intellectual property right is not readily available protection, especially for standard agreement IP (such as USB3.0), even if carrying out to code Encryption, the encrypted code of the same IP still can be repeatedly used in different SOC projects.
About solid core (Firm IP): RTL program passes through simulating, verifying, and after meeting design requirement, designer sets by electronics It counts automation tools (EDA), from corresponding logic gate is chosen in cell library (Cell Library), RTL file is converted into Netlist (Netlist) file presented in the form of logic gate, the net meter file, that is, so-called solid core.Gu core is soft core and hard The compromise of core has higher reliability compared to soft core, has higher flexibility compared to stone, but solid core still can not Logic Modification is carried out according to the demand of client as soft core.
About stone (Hard IP): net meter file is after verifying, the step of into entity design, first carries out functional group Block position configuration design (Floor Planning), then be laid out with wires design (Place&Routing), finish entity Layout and wiring after generated GDSII file, as stone.Technique has been completed and can not have been modified when stone designs, and is used The stone that family obtains is only product function rather than product design, thus stone design and manufacturer to it carry out full powers control System, and relative to soft core and solid core, the intellectual property protection of stone is also fairly simple.
USB3.0 is a kind of standard IP being widely used, and takes effective measures and carries out intellectual property protection to it and have become The research direction expanded is needed for industry, but the current prior art not can solve this technical problem yet.
Summary of the invention
In view of the foregoing deficiencies of prior art, the purpose of the present invention is to provide the infringement identifications based on usb protocol Method, system, terminal and medium can not effectively ask the IP technology for carrying out intellectual property protection in the prior art for solving Topic.
In order to achieve the above objects and other related objects, the present invention provides a kind of infringement recognition methods based on usb protocol, Applied to USB Devices to test, which comprises receive the trigger signal from USB test equipment and judge the trigger signal Whether trigger condition is met;If meeting trigger condition, is triggered from normal mode of operation and enter protection recognition mode, issued accordingly The identification the data whether soft core for analyzing the USB Devices to test encroaches right.
In one embodiment of the invention, the mode for judging whether trigger signal meets trigger condition includes: according to triggering The number that signal specific occurs in signal judges whether the trigger signal meets trigger condition.
In one embodiment of the invention, which comprises judge in received trigger signal containing specific character Whether the quantity of TS1 training sequence reaches preset quantity;If reaching preset times, judge that the trigger signal meets triggering item Part.
In one embodiment of the invention, the mode for judging whether trigger signal meets trigger condition includes: according to triggering The content of signal judges whether the trigger signal meets trigger condition.
In one embodiment of the invention, which comprises judge in received trigger signal whether to include containing spy The user for determining content tests link management data packet;If including judging that the trigger signal meets trigger condition.
In one embodiment of the invention, the identification data include in reserve bytes inserted with protection cognizance code Synchronized timestamp packet;The infringement recognition methods includes: to analyze identification corresponding to protection cognizance code by USB analytical equipment Information judges whether the USB Devices to test is authorisation device accordingly;Wherein, the identification information includes grantee's title, awards Weigh the combination of batch, any information in the authorization time or much information.
In one embodiment of the invention, the USB Devices to test is to communicating the USB of connection from device periodically Send the synchronized timestamp packet inserted with protection cognizance code in reserve bytes;The USB analytical equipment is to be measured from USB Equipment captures the synchronized timestamp packet from USB from the device.
In one embodiment of the invention, the protection is identified generation by ACSII code conversion by the USB analytical equipment Code is converted to corresponding identification information.
In one embodiment of the invention, the method also includes the USB Devices to test to be reset or re-power Recognition mode is protected described in backed off after random.
In order to achieve the above objects and other related objects, the present invention provides a kind of infringement recognition methods based on usb protocol, Applied to USB analytical equipment, which comprises the identification data that capture USB equipment to be analyzed issues;According to the identification number According to whether the soft core for analyzing the USB Devices to test encroaches right;Wherein, the USB Devices to test is received from USB test equipment Trigger signal simultaneously judges whether the trigger signal meets trigger condition, if meeting trigger condition from normal mode of operation trigger into Enter and protect recognition mode, issues the identification data accordingly.
In order to achieve the above objects and other related objects, the present invention provides a kind of electric terminal, comprising: processor, storage Device, transceiver;The memory is for storing computer program, and the transceiver with external device communication for connecting;It is described Processor is used to execute the computer program of the memory storage, so that the terminal executes the infringement recognition methods.
In order to achieve the above objects and other related objects, the present invention provides a kind of computer readable storage medium, deposits thereon Computer program is contained, which realizes the infringement recognition methods when being executed by processor.
In order to achieve the above objects and other related objects, the present invention provides a kind of infringement identifying system based on usb protocol, Comprising: USB test equipment, for sending trigger signal to USB Devices to test;USB analytical equipment, for analyzing the USB Whether the soft core of Devices to test encroaches right;Wherein, whether the trigger signal that the USB Devices to test judgement receives meets triggering item Part;If satisfied, issuing identification data then so that the USB analytical equipment analyzes whether its soft core encroaches right.
As described above, infringement recognition methods, system, terminal and the medium of the invention based on usb protocol, has following Protection identification generation is inserted into Isochronous Timestamp Packets (ITP) the utility model has the advantages that the invention proposes one kind Code scheme, using and USB3.0 protocol depth binding by the way of, effectively to the soft core of usb host carry out intellectual property protection, When being used in the case that soft core is without permission and be made product, can by by specific equipment send specific sequence from And trigger and enter protection recognition mode, soft core infringement identification is carried out accordingly.Compared to traditional soft core infringement identification mode, this hair It is bright to be easier to protection independent intellectual property right, there is higher infringement protection reliability;Compared to solid core infringement identification mode, the present invention Also there is higher flexibility while taking into account reliability;And compared to stone infringement identification mode, the present invention has higher Flexibility.
Detailed description of the invention
Fig. 1 is shown as the schematic diagram of the infringement identifying system in one embodiment of the invention based on usb protocol.
Fig. 2 a is shown as the schematic diagram of the format of ITP in one embodiment of the invention.
Fig. 2 b is shown as the schematic diagram of the content of ITP in one embodiment of the invention.
Fig. 3 is shown as in one embodiment of the invention the flow diagram of the infringement recognition methods based on usb protocol.
Fig. 4 is shown as the schematic diagram that user in one embodiment of the invention tests link management data packet.
Fig. 5 is shown as in one embodiment of the invention the flow diagram of the infringement recognition methods based on usb protocol.
Fig. 6 is shown as in one embodiment of the invention the flow diagram of the infringement recognition methods based on usb protocol.
Fig. 7 is shown as the structural schematic diagram of electric terminal in one embodiment of the invention.
Fig. 8 is shown as the structural schematic diagram of electric terminal in one embodiment of the invention.
Component label instructions
The 11 infringement identifying systems based on usb protocol
12 USB test equipments
13 USB analytical equipments
14 USB Devices to test
15 USB are from equipment
71 processors
72 memories
73 transceivers
74 communication interfaces
75 system bus
81 processors
82 memories
83 transceivers
84 communication interfaces
85 system bus
S31~S32 method flow
S51~S53 method flow
S61~S62 method flow
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from Various modifications or alterations are carried out under spirit of the invention.It should be noted that in the absence of conflict, following embodiment and implementation Feature in example can be combined with each other.
It should be noted that with reference to attached drawing, attached drawing describes several embodiments of the application in described below.It should Understand, other embodiments also can be used, and mechanical group can be carried out without departing substantially from spirit and scope At, structure, electrical and operational change.Following detailed description should not be considered limiting, and the application The range of embodiment only limited by the claims for the patent announced.Term used herein is merely to description is specific Embodiment, and it is not intended to limit the application.The term of space correlation, for example, "upper", "lower", "left", "right", " following ", " under Side ", " " lower part ", " top ", " top " etc., can use in the text in order to elements or features shown in explanatory diagram with The relationship of another elements or features.
Furthermore as used in herein, singular " one ", " "one" and "the" are intended to also include plural shape Formula, unless there is opposite instruction in context.It will be further understood that term "comprising", " comprising " show that there are the spies Sign, operation, element, component, project, type, and/or group, but it is not excluded for one or more other features, operation, element, group Presence, appearance or the addition of part, project, type, and/or group.Term "or" and "and/or" used herein are interpreted as including Property, or mean any one or any combination.Therefore, " A, B or C " or " A, B and/or C " mean " it is following any one: A;B;C;A and B;A and C;B and C;A, B and C ".Only when the combination of element, functions or operations is inherently mutual under certain modes When repulsion, it just will appear the exception of this definition.
The present invention provides infringement recognition methods, system, terminal and medium based on usb protocol, is used for Isochronous Timestamp Packets (ITP), i.e., insertion protection protection cognizance code in synchronized timestamp packet, and base In the mode bound with USB3.0 protocol depth, intellectual property protection effectively is carried out to the soft core of usb host, works as usb host When soft core is used in the case where without permission and is made into product, specific sequence can be sent by specific equipment and triggered Protection protection cognizance code, and identified according to the content of protection protection cognizance code, so that it is determined that whether the soft core of host invades Power.
The USB is the abbreviation of English Universal Serial Bus (universal serial bus), is an external bus Standard, for being connected and communicate with for specification computer and external equipment.The plug and play and hot plug function of USB interface holding equipment Energy.USB standard will be proposed in the end of the year 1994 by Intel, Compaq, IBM, Microsoft Deng Duo company joint, extensive Applied to the various electronic equipments such as computer, mobile phone, digital camera.
USB standard is specified by USB official organization USB-IF and safeguards, from start successively to have issued so far USB1.1, Five versions of USB2.0, USB3.0, USB3.1, USB3.2, new version forward compatibility legacy version.The maximum biography that each version is supported Defeated rate is respectively as follows: USB1.1 and peak transfer rate 12Mbps, USB2.0 is supported to support peak transfer rate 480Mbps, USB3.0 supports peak transfer rate 5Gbps, USB3.1 that peak transfer rate 10Gbps, USB3.2 is supported to support maximum transmitted speed Rate 20Gbps.USB3.0 is a kind of standard IP being widely used, and adopting an effective measure and carrying out intellectual property protection to it is ten It is point necessary, illustrate embodiments of the present invention and realization principle below in conjunction with embodiment.
As shown in Figure 1, showing the schematic diagram of the infringement identifying system based on usb protocol in one embodiment of the invention.It is described Whether infringement identifying system 11 based on usb protocol for identification encroach right by the soft core of USB Devices to test, and the system comprises USB points Desorption device 13 and USB test equipment 12.Below with the USB analytical equipment 13 based on USB3.0 agreement, USB test equipment 12, USB Illustrate realization principle of the invention for Devices to test 14.
The USB Devices to test 14 is periodically attached thereto and to all in work shape in normal mode of operation U0 The USB of state sends Isochronous Timestamp Packets (ITP) from equipment 15 in the form of broadcast, that is, sends and synchronize Timestamp packet.The USB Devices to test 14 be, for example, usb host (host), USB from equipment 15 be, for example, USB HUB or USB Device etc..
For ease of description, the present invention illustrates Isochronous Timestamp Packets by taking Fig. 2 a and 2b as an example (ITP) format and content.The length of Isochronous Timestamp Packets (ITP) is 20 bytes, 4 word therein Section is stamp packet packet header Framing, and in addition 16 bytes are stamp packet content.Isochronous Timestamp Packets's (ITP) 8th byte to the 12nd byte is reserve bytes, and according to USB3.0 agreement, default is set as zero when reserve bytes are sent, recipient It is not checked after receiving, therefore carries protection identification information using reserve bytes and will not influence the normal work of USB3.0 equipment.
The USB test equipment 12 is for sending trigger signal to USB Devices to test 14;USB Devices to test 14 is triggered Enter protection recognition mode from normal mode of operation afterwards, to issue the ITP inserted with protection cognizance code, USB analytical equipment 13 for capturing the ITP inserted with protection cognizance code, and whether the soft core for analyzing USB Devices to test 14 accordingly encroaches right.Under Face is in conjunction with illustrating how to identify whether the soft core of USB Devices to test 14 encroaches right based on the infringement recognition methods of usb protocol.
As shown in figure 3, showing the flow diagram of the infringement recognition methods in one embodiment of the invention based on usb protocol. In this present embodiment, the infringement recognition methods based on usb protocol is applied to USB Devices to test, with usb host (host) work For USB Devices to test, the infringement recognition methods based on usb protocol is specifically included:
S31: it receives the trigger signal from USB test equipment and judges whether the trigger signal meets trigger condition.Tool Body, it can judge whether the trigger signal meets trigger condition according to the number that signal specific in trigger signal occurs, it can also Judge whether the trigger signal meets trigger condition according to the content of trigger signal, or may also be combined with specific in trigger signal The content of number and trigger signal that signal occurs judges that this is not limited by the present invention.
It is described to judge whether the trigger signal meets triggering item and be according to the number of signal specific appearance in trigger signal Refer to, USB test equipment transmission TS1 training sequence to usb host, and inserted with specific in the reserve bytes of the TS1 training sequence Character then judges the triggering when the quantity that usb host receives the TS1 training sequence containing specific character reaches preset quantity Signal meets trigger condition.
Described to judge whether the trigger signal meets trigger condition and refer to according to the content of trigger signal, USB test is set It is standby to send user's test link management data packet (Vendor Device Test containing specific content in normal mode of operation U0 LinkManagement Packet).For ease of description, showing that user tests link management data packet (Vendor by taking Fig. 4 as an example DeviceTest Link Management Packet) schematic diagram.User test link management data packet DWORD1 and Specific information is inserted in DWORD2, after usb host, which receives the user containing the specific information, tests link management data packet, Just it is triggered from normal mode of operation and enters protection recognition mode.
S32: if meeting trigger condition, enter protection recognition mode from normal mode of operation triggering, issued accordingly for dividing Analyse the identification the data whether soft core of the USB Devices to test encroaches right.
As described above, usb host is periodically attached thereto and to all in work in normal mode of operation U0 The USB for making state sends Isochronous Timestamp Packets (ITP) from equipment in the form broadcasted, that is, sends same Walk timestamp packet.Therefore, when the trigger signal that USB test equipment issues meets trigger condition, then usb host is triggered into It protects recognition mode and issues identification data, the identification data refer in reserve bytes inserted with protection cognizance code Isochronous Timestamp Packets (ITP) synchronized timestamp packet, so as to effectively to the soft core of usb host into Row identification and protection.
According to the definition of Isochronous Timestamp Packets (ITP), an Isochronous There is the space of 5 bytes that can carry protection cognizance code in Timestamp Packets (ITP), therefore the present embodiment is using beauty State's standard code for information interchange (ASCII, American Standard Code for Information Interchange) Coding mode, identification information is converted into protection cognizance code.Wherein, the identification information includes grantee's title, awards Weigh the combination of batch, any information in the authorization time or much information.
Each byte in ITP reserve bytes is for indicating a upper and lower case letter, number or punctuation mark, as USB master After machine enters protection recognition mode, pass through the reserve bytes in continuous Isochronous Timestamp Packets (ITP) Middle insertion protects cognizance code to complete the label to usb host.Due to an Isochronous Timestamp Packets (ITP) the protection cognizance code that can carry most 5 bytes, therefore the present embodiment uses Isochronous Timestamp 9th to the 12nd reserve bytes carry protection cognizance code in Packets (ITP), by identification information it is letter-by-letter be converted to guarantor It is inserted into continuous ITP reserve bytes after shield cognizance code and periodically sends.
After usb host issues the ITP inserted with protection cognizance code, USB analytical equipment captures what usb host issued ITP extracts the protection cognizance code of reserve bytes in continuous ITP, and is decoded according to ASCII coding mode, to obtain Corresponding identification information.The identification information that USB analytical equipment is obtained according to decoding judges whether the usb host is that authorization produces Product, for example, can proofread the authorization title of the USB3.0, authorization batch etc. information whether with the authorization title in grant column list, authorization Batch matching;If matching, illustrates that the soft core of the usb host is not encroached right;If mismatching, illustrate the soft core of the usb host for infringement Product.
In one embodiment, USB analytical equipment can usb host issue inserted with protection cognizance code ITP after and In USB before equipment reception, just capture is described inserted with the ITP for protecting cognizance code.In another embodiment, USB is analyzed Equipment can also usb host equipment issue inserted with protection cognizance code ITP after and USB from equipment reception after, from USB captures the ITP inserted with protection cognizance code from the device.Therefore, USB analytical equipment is based on a variety of acquisition modes, The stability of ITP data capture can be promoted.
Optionally, the USB analytical equipment is, for example, usb protocol analyzer, and usb protocol analyzer is the analysis of protocol layer Tool is a kind of test equipment.For high-speed serial bus this for USB, it is far from enough for only carrying out physical layer test , therefore need special usb protocol analyzer to test USB transport protocol.Usb protocol analyzer is according to standard Data comprising useful information are extracted and explain the meaning of these data by usb protocol decomposition data.
As shown in figure 5, showing the flow diagram of the infringement recognition methods in one embodiment of the invention based on usb protocol. In this present embodiment, the infringement recognition methods includes:
S51: it receives the trigger signal from USB test equipment and judges whether the trigger signal meets trigger condition.
S52: if meeting trigger condition, enter protection recognition mode from normal mode of operation triggering, issued accordingly for dividing Analyse the identification the data whether soft core of the USB Devices to test encroaches right.
S53: the USB Devices to test, which is reset or re-powers, protects recognition mode described in backed off after random, to realize Mode conversion rapidly and efficiently.Because of the implementation procedure and the implementation procedure class of above step S11~S12 of step S41~S42 Seemingly, so it will not be repeated.
It is worth noting that, the infringement recognition methods provided by the invention based on usb protocol, proposes one kind and exists The scheme of insertion protection cognizance code in Isochronous Timestamp Packets (ITP), using deep with USB3.0 agreement The mode of binding is spent, intellectual property protection effectively is carried out to the soft core of usb host, is made in the case that soft core is without permission With and when being made product, can be triggered into protection recognition mode, accordingly by sending specific sequence by specific equipment Carry out soft core infringement identification.Compared to traditional soft core infringement identification mode, the present invention is easier to protection independent intellectual property right, has Higher infringement protection reliability;Compared to solid core infringement identification mode, the present invention also has more while taking into account reliability High flexibility;And compared to stone infringement identification mode, the present invention has higher flexibility.
As shown in fig. 6, showing the flow diagram of the infringement recognition methods in one embodiment of the invention based on usb protocol. In this present embodiment, the infringement recognition methods is applied to USB analytical equipment, which comprises
The identification data that S61: capture USB equipment to be analyzed issues.
S62: according to the identification data, whether the soft core for analyzing the USB Devices to test encroaches right;Wherein, the USB is to be measured Equipment receives the trigger signal from USB test equipment and judges whether the trigger signal meets trigger condition, if meeting triggering Condition, which is then triggered from normal mode of operation, enters protection recognition mode, issues the identification data accordingly.The USB analytical equipment For example, usb protocol analyzer, because in the present embodiment be applied to USB analytical equipment infringement recognition methods be above applied to The infringement recognition methods of USB Devices to test is similar, and so it will not be repeated.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of computer program is crossed to complete.Computer program above-mentioned can store in a computer readable storage medium In.When being executed, execution includes the steps that above-mentioned each method embodiment to the program;And storage medium above-mentioned include: ROM, The various media that can store program code such as RAM, magnetic or disk.
As shown in fig. 7, showing the schematic diagram of electric terminal in one embodiment of the invention.The electric terminal includes processor 71, memory 72, transceiver 73, communication interface 74 and system bus 75.The memory 72 and communication interface 74 pass through system Bus 75 connect with processor 71 and transceiver 73 and completes mutual communication, and memory 72 is used to store computer program, Communication interface 74 and transceiver 73 are used for and other equipment are communicated, and processor 71 makes electronics for running computer program Terminal executes each step in step S31~S32 or step S51~S53 as above.
As shown in figure 8, showing the schematic diagram of electric terminal in one embodiment of the invention.The electric terminal includes processor 81, memory 82, transceiver 83, communication interface 84 and system bus 85.The memory 82 and communication interface 84 pass through system Bus 85 connect with processor 81 and transceiver 83 and completes mutual communication, and memory 82 is used to store computer program, Communication interface 84 and transceiver 83 are used for and other equipment are communicated, and processor 81 makes electronics for running computer program Terminal executes each step in step S61~S62 as above.
System bus mentioned above can be Peripheral Component Interconnect standard (PeripheralPomponentInterconnect, abbreviation PCI) bus or expanding the industrial standard structure (ExtendedIndu StryStandardArchitecture, abbreviation EISA) bus etc..The system bus can be divided into address bus, data/address bus, Control bus etc..Only to be indicated with a thick line in figure, it is not intended that an only bus or a type of convenient for indicating Bus.Communication interface is for realizing between database access device and other equipment (such as client, read-write library and read-only library) Communication.Memory may include random access memory (RandomAccessMemory, abbreviation RAM), it is also possible to further include Nonvolatile memory (non-volatilememory), for example, at least a magnetic disk storage.
Above-mentioned processor can be general processor, including central processing unit (CentralProcessingUnit, letter Claim CPU), network processing unit (NetworkProcessor, abbreviation NP) etc.;It can also be digital signal processor (DigitalSignalProcessing, abbreviation DSP), specific integrated circuit (ApplicationSpecificIntegrated Circuit, abbreviation ASIC), field programmable gate array (Field-ProgrammableGateArray, abbreviation FPGA) or Other programmable logic device, discrete gate or transistor logic, discrete hardware components.
In conclusion the present invention provides infringement recognition methods, system, terminal and medium based on usb protocol, propose The scheme of one kind insertion protection cognizance code in Isochronous Timestamp Packets (ITP), use and USB3.0 The mode of protocol depth binding, effectively carries out intellectual property protection to the soft core of usb host, when soft core is without permission the case where It is lower when being used and being made product, it can be triggered by sending specific sequence by specific equipment into protection identification mould Formula carries out soft core infringement identification accordingly.Compared to traditional soft core infringement identification mode, the present invention is easier to protection independent intellectual and produces Power has higher infringement protection reliability;Compared to solid core infringement identification mode, the present invention is gone back while taking into account reliability With higher flexibility;And compared to stone infringement identification mode, the present invention has higher flexibility.So the present invention It effectively overcomes various shortcoming in the prior art and has high industrial utilization value.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as At all equivalent modifications or change, should be covered by the claims of the present invention.

Claims (14)

1. a kind of infringement recognition methods based on usb protocol, which is characterized in that be applied to USB Devices to test, the method packet It includes:
It receives the trigger signal from USB test equipment and judges whether the trigger signal meets trigger condition;
If meeting trigger condition, is triggered from normal mode of operation and enter protection recognition mode, issued waited for for analyzing the USB accordingly The identification the data whether soft core of measurement equipment encroaches right.
2. the infringement recognition methods according to claim 1 based on usb protocol, which is characterized in that judge that trigger signal is The no mode for meeting trigger condition includes: to judge whether the trigger signal is full according to the number that signal specific in trigger signal occurs Sufficient trigger condition.
3. the infringement recognition methods according to claim 2 based on usb protocol characterized by comprising
Judge whether the quantity of the TS1 training sequence in received trigger signal containing specific character reaches preset quantity;
If reaching preset times, judge that the trigger signal meets trigger condition.
4. the infringement recognition methods according to claim 1 based on usb protocol, which is characterized in that judge that trigger signal is The no mode for meeting trigger condition includes: to judge whether the trigger signal meets triggering item according to the content of trigger signal Part.
5. the infringement recognition methods according to claim 4 based on usb protocol characterized by comprising
Judge in received trigger signal whether to include that the user containing specific content tests link management data packet;
If including judging that the trigger signal meets trigger condition.
6. the infringement recognition methods according to claim 1 based on usb protocol, which is characterized in that the identification data packet Include the synchronized timestamp packet inserted with protection cognizance code in reserve bytes;The infringement recognition methods includes: by USB points Identification information corresponding to desorption device analysis protection cognizance code, judges whether the USB Devices to test is authorisation device accordingly;Its In, the identification information includes grantee's title, authorization batch, the group of any information in the authorization time or much information It closes.
7. the infringement recognition methods according to claim 6 based on usb protocol, which is characterized in that the USB Devices to test The synchronization inserted with protection cognizance code in reserve bytes from device periodically is sent to the USB for communicating connection Timestamp packet;The USB analytical equipment captures the synchronized timestamp packet from USB Devices to test or from USB from the device.
8. the infringement recognition methods according to claim 6 based on usb protocol, which is characterized in that the USB analytical equipment The protection cognizance code is converted into corresponding identification information by ACSII code conversion.
9. the infringement recognition methods according to claim 1 based on usb protocol, which is characterized in that the method also includes The USB Devices to test, which is reset or re-powers, protects recognition mode described in backed off after random.
10. a kind of infringement recognition methods based on usb protocol, which is characterized in that be applied to USB analytical equipment comprising:
Capture the identification data that USB equipment to be analyzed issues;
According to the identification data, whether the soft core for analyzing the USB Devices to test encroaches right;Wherein, the USB Devices to test receives Trigger signal from USB test equipment simultaneously judges whether the trigger signal meets trigger condition, if meeting trigger condition from Normal mode of operation triggering enters protection recognition mode, issues the identification data accordingly.
11. a kind of electric terminal characterized by comprising processor, memory, transceiver;
The memory is for storing computer program, and the transceiver with external device communication for connecting;The processor For executing the computer program of the memory storage, so that the terminal is executed as described in any one of claims 1 to 9 Infringement recognition methods.
12. a kind of electric terminal characterized by comprising processor, memory, transceiver;
The memory is used to execute the computer journey of the memory storage for storing computer program, the processor Sequence, so that the terminal executes infringement recognition methods as claimed in claim 10.
13. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor Infringement recognition methods described in any one of claims 1 to 9 is realized when execution or realizes infringement described in any one of claim 10 Recognition methods.
14. a kind of infringement identifying system based on usb protocol characterized by comprising
USB test equipment, for sending trigger signal to USB Devices to test;
Whether USB analytical equipment, the soft core for analyzing the USB Devices to test encroach right;Wherein, the USB Devices to test is sentenced Whether the trigger signal that disconnecting receives meets trigger condition;If satisfied, issuing identification data then for the USB analytical equipment point Analyse whether its soft core encroaches right.
CN201910211819.5A 2019-03-20 2019-03-20 Infringement recognition methods, system, terminal and medium based on usb protocol Pending CN110018977A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910211819.5A CN110018977A (en) 2019-03-20 2019-03-20 Infringement recognition methods, system, terminal and medium based on usb protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910211819.5A CN110018977A (en) 2019-03-20 2019-03-20 Infringement recognition methods, system, terminal and medium based on usb protocol

Publications (1)

Publication Number Publication Date
CN110018977A true CN110018977A (en) 2019-07-16

Family

ID=67189749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910211819.5A Pending CN110018977A (en) 2019-03-20 2019-03-20 Infringement recognition methods, system, terminal and medium based on usb protocol

Country Status (1)

Country Link
CN (1) CN110018977A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111897755A (en) * 2020-06-15 2020-11-06 深圳市广和通无线股份有限公司 Log capture method and device and switching module
CN112597444A (en) * 2020-12-29 2021-04-02 芯启源电子科技有限公司 USB device IP infringement identification method based on USB protocol and terminal thereof

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881196A (en) * 2005-06-16 2006-12-20 联发科技股份有限公司 Method for controlling host from device coupled thereto using universal serial bus and system thereof
US20120060045A1 (en) * 2009-05-20 2012-03-08 Chronologic Pty. Ltd. Method and apparatus for synchronising the local time of a plurality of instruments
CN109102436A (en) * 2018-06-22 2018-12-28 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS1 training sequence
CN109145527A (en) * 2018-06-22 2019-01-04 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence
CN109165481A (en) * 2018-06-22 2019-01-08 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS2 training sequence
CN109165482A (en) * 2018-06-22 2019-01-08 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS1 training sequence
CN109214144A (en) * 2018-08-01 2019-01-15 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS2 training sequence
CN109214143A (en) * 2018-08-01 2019-01-15 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS1 training sequence

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881196A (en) * 2005-06-16 2006-12-20 联发科技股份有限公司 Method for controlling host from device coupled thereto using universal serial bus and system thereof
US20120060045A1 (en) * 2009-05-20 2012-03-08 Chronologic Pty. Ltd. Method and apparatus for synchronising the local time of a plurality of instruments
CN109102436A (en) * 2018-06-22 2018-12-28 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS1 training sequence
CN109145527A (en) * 2018-06-22 2019-01-04 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS2 training sequence
CN109165481A (en) * 2018-06-22 2019-01-08 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.0 agreement TS2 training sequence
CN109165482A (en) * 2018-06-22 2019-01-08 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.1 agreement TS1 training sequence
CN109214144A (en) * 2018-08-01 2019-01-15 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS2 training sequence
CN109214143A (en) * 2018-08-01 2019-01-15 芯启源(上海)半导体科技有限公司 The soft core property right protection of IP and infringement identification method based on USB3.2 agreement TS1 training sequence

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
兀颖: ""基于USB3.0的数据采集系统设计"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
李丽萍等: ""网络传输中采用隐蔽通道实现秘密通信"", 《计算机科学》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111897755A (en) * 2020-06-15 2020-11-06 深圳市广和通无线股份有限公司 Log capture method and device and switching module
CN112597444A (en) * 2020-12-29 2021-04-02 芯启源电子科技有限公司 USB device IP infringement identification method based on USB protocol and terminal thereof
WO2022141731A1 (en) * 2020-12-29 2022-07-07 芯启源(上海)半导体科技有限公司 Usb device ip infringement identification method and terminal based on usb protocol
CN112597444B (en) * 2020-12-29 2024-01-09 芯启源(上海)半导体科技有限公司 USB equipment IP infringement identification method based on USB protocol and terminal thereof

Similar Documents

Publication Publication Date Title
CN106845219B (en) A kind of intrusion detection smart machine for multiple types of data
JP2018523217A (en) Transmission of transaction-specific attributes in the peripheral component interconnect express (PCIE) system
CN110018977A (en) Infringement recognition methods, system, terminal and medium based on usb protocol
Yang et al. A high-performance on-chip bus (MSBUS) design and verification
CN104077203A (en) Method and device for diagnosing computer hardware through USB interface
US20110225559A1 (en) Logic verifying apparatus, logic verifying method, and medium
CN109214144B (en) IP soft core property protection and infringement identification method based on USB3.2 protocol TS2 training sequence
CN109102436B (en) IP soft core property protection and infringement identification method based on USB3.0 protocol TS1 training sequence
Sangani et al. Uvm based verification of read and write transactions in axi4-lite protocol
CN109165482B (en) IP soft core property protection and infringement identification method based on USB3.1 protocol TS1 training sequence
CN109214143B (en) IP soft core property protection and infringement identification method based on USB3.2 protocol TS1 training sequence
CN109145527B (en) IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence
CN109165481B (en) IP soft core property protection and infringement identification method based on USB3.0 protocol TS2 training sequence
CN114861594B (en) Low-power-consumption verification method, device, equipment and storage medium of chip
CN114327975A (en) System on chip
CN110413461B (en) System and method for measuring transmission delay between accelerator card and host and accelerator card
CN112597444B (en) USB equipment IP infringement identification method based on USB protocol and terminal thereof
CN113496108A (en) CPU model applied to simulation
US20050086561A1 (en) Testing device
Prasad et al. Development of VIP for AMBA AXI-4.0 Protocol
CN104049997B (en) Satellite receiver on-line loading method based on multiplexing technology
Varughese Implementation of extended Open Core Protocol interface memory system using Verilog HDL
CN115684897B (en) Method and device for testing chip
CN113297114B (en) Method for supporting multiple processes and multiple threads based on PCIE (peripheral component interface express) independent IO (input/output) of encryption card
EP4242860A1 (en) A device for decoding the data communication under universal serial bus standard

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190716