CN112052465B - Protection method for integrated circuit diagram design - Google Patents

Protection method for integrated circuit diagram design Download PDF

Info

Publication number
CN112052465B
CN112052465B CN202010876777.XA CN202010876777A CN112052465B CN 112052465 B CN112052465 B CN 112052465B CN 202010876777 A CN202010876777 A CN 202010876777A CN 112052465 B CN112052465 B CN 112052465B
Authority
CN
China
Prior art keywords
view
netlist file
circuit diagram
simulator
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010876777.XA
Other languages
Chinese (zh)
Other versions
CN112052465A (en
Inventor
高立博
闫珍珍
卜建辉
罗家俊
韩郑生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Microelectronics of CAS
Original Assignee
Institute of Microelectronics of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Microelectronics of CAS filed Critical Institute of Microelectronics of CAS
Priority to CN202010876777.XA priority Critical patent/CN112052465B/en
Publication of CN112052465A publication Critical patent/CN112052465A/en
Application granted granted Critical
Publication of CN112052465B publication Critical patent/CN112052465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/32Circuit design at the digital level
    • G06F30/33Design verification, e.g. functional simulation or model checking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Evolutionary Computation (AREA)
  • Geometry (AREA)
  • Design And Manufacture Of Integrated Circuits (AREA)

Abstract

The invention discloses a protection method for integrated circuit diagram design, which is applied to a design end of a cell library, wherein the cell library comprises a plurality of cells, each cell comprises a circuit diagram view, and the method comprises the following steps: deriving a simulator netlist file for the circuit diagram view of each cell; encrypting the emulator netlist file by using an emulator encryption program to obtain an encrypted netlist file; creating a symbol view and a simulator view for the cell; and sending the encrypted netlist file, the symbolic view and the simulator view of each unit to a collaboration terminal, so that the collaboration terminal creates an integrated circuit diagram by calling the symbolic view, and when simulating the integrated circuit diagram, calling the encrypted netlist file to decrypt, obtaining a decrypted netlist file based on the simulator view, and simulating the integrated circuit diagram based on the decrypted netlist file. The technical problem of lacking a protection scheme for an integrated circuit diagram design capable of reliably protecting a core in the prior art is solved.

Description

Protection method for integrated circuit diagram design
Technical Field
The present invention relates to the field of integrated circuit design, and in particular, to a protection method for integrated circuit diagram design.
Background
As the design requirements of integrated circuits become more complex, the size of the design project becomes larger and the entire design is distributed to multiple people for collaborative development, while collaborative development is performed, some design details of the integrated circuits are not desired to be obtained by each other, and thus a new problem is involved in the design development process of the integrated circuits, namely, protection of the circuit diagram design, for example: the reinforcement design of the circuit diagram in the radiation-resistant reinforcement cell library is used as a core technology and needs protection.
In the prior art, the following two modes are generally adopted for protection:
first, protection of circuit diagram design is performed using confusion techniques, such as: and (3) inserting redundant circuits, equivalent replacement of devices, irregular arrangement of devices, breaking connection lines, using meaningless marks and the like. The advantage of this approach is that it gives a great reading and analysis obstacle to the circuit diagram, and thus a protective capability of the circuit diagram design, but this solution has the following drawbacks:
(1) The inserted redundancy circuit may introduce unnecessary parasitic side effects and the like, and thus may have an influence on functional equivalence.
(2) The user obtains the circuit diagram, and through means such as reverse engineering and analysis, the user can still obtain the information that the original circuit diagram is considerable, therefore there is the risk of circuit diagram design leakage in the art.
Second, behavioral level language descriptions, using a behavioral level language such as verilog to describe the functionality of cells in the integrated circuit cell library, instead of circuit diagrams. Because the circuit diagram is a transistor-level description, and the behavioral language description of verilog is more abstract, the details of the structure are lacking, and the accuracy is insufficient.
Therefore, in the prior art, there is a lack of a scheme for designing an integrated circuit diagram capable of reliably protecting a core so that a collaborator can use the design, but details of the design cannot be obtained by reverse or the like.
Disclosure of Invention
The embodiment of the application solves the technical problem that a protection scheme for the integrated circuit diagram design capable of reliably protecting a core is lacked in the prior art by providing the protection method for the integrated circuit diagram design.
On the one hand, the present application provides the following technical solutions through an embodiment of the present application:
a protection method for integrated circuit diagram design, applied to a design end of a cell library, the cell library comprising a plurality of cells, each cell of the plurality of cells comprising a circuit diagram view, the method comprising: deriving a simulator netlist file from the circuit diagram view for each of the cells; encrypting the emulator netlist file by using an emulator encryption program to obtain an encrypted netlist file; creating a symbolic view for the cell; creating a simulator view for the cell; and sending the encrypted netlist file, the symbolic view and the simulator view corresponding to each unit in the unit library to a cooperation end, so that the cooperation end creates an integrated circuit diagram by calling the symbolic view, and when simulating the integrated circuit diagram, calling the encrypted netlist file corresponding to the symbolic view to decrypt, obtaining a decrypted netlist file based on the simulator view corresponding to the symbolic view, and simulating the integrated circuit diagram based on the decrypted netlist file, wherein the simulator view is used for providing the file structure of the decrypted netlist file.
In one embodiment, the circuit diagram view includes devices of the unit, connection information of the devices, and port information; the creating a symbolic view for the unit includes: determining a view graph; and replacing the device of the unit and the connection information of the device in the circuit diagram view by using the view graph, and reserving the port information to obtain the symbol view.
In one embodiment, the circuit diagram view includes port information for the unit; the creating a simulator view for the unit includes: acquiring port information of the unit; based on the port information of the cell, an emulator view of the cell is generated.
In one embodiment, when the emulator netlist file is an hspice netlist file, encrypting the emulator netlist file by using a metaencrypter encryption program to obtain the encrypted netlist file.
In one embodiment, when the emulator netlist file is a select netlist file, the emulator netlist file is encrypted by a select_encrypter encryption program to obtain the encrypted netlist file.
In one embodiment, before the sending the encrypted netlist file, the symbolic view and the simulator view corresponding to each unit in the unit library to the collaboration end, the method further includes: merging the encrypted netlist files corresponding to each unit in the unit library to obtain an encrypted library model file of the unit library; the sending the encrypted netlist file, the symbolic view and the simulator view corresponding to each unit in the unit library to a collaboration terminal includes: and sending the encrypted library model file and the symbol view and the simulator view corresponding to each unit in the unit library to the collaboration terminal, so that the collaboration terminal calls the encrypted netlist file corresponding to the symbol view from the encrypted library model file to decrypt, obtains the decrypted netlist file based on the simulator view corresponding to the symbol view, and simulates the integrated circuit diagram based on the decrypted netlist file.
On the other hand, the application provides the following technical scheme through an embodiment of the application:
a protection method for integrated circuit diagram design, applied to a collaboration terminal, the method comprising: receiving a data packet of a cell library sent by a design end, wherein the cell library comprises a plurality of cells, and the data packet comprises an encrypted netlist file, a symbol view and a simulator view corresponding to each of the cells, wherein the encrypted netlist file is a result of encrypting the simulator netlist file by using a simulator encryption program after the design end derives the simulator netlist file through the circuit diagram view of the cells; in response to a first operation of a user, invoking the symbol view corresponding to at least one of the plurality of units to create an integrated circuit diagram; and responding to the second operation of the user, calling the encrypted netlist file corresponding to the symbolic view to decrypt, obtaining a decrypted netlist file based on the simulator view corresponding to the symbolic view, and simulating the integrated circuit diagram based on the decrypted netlist file, wherein the simulator view is used for providing a file structure of the decrypted netlist file.
In one embodiment, the data packet includes: the encryption library model file is a result of merging the encryption netlist file corresponding to each unit in the unit library by the design end; the step of calling the encrypted netlist file corresponding to the symbolic view to decrypt, obtaining a decrypted netlist file based on the simulator view corresponding to the symbolic view, simulating the integrated circuit diagram based on the decrypted netlist file, and comprising the following steps: and calling the encrypted netlist file corresponding to the symbolic view from the encrypted library model file to decrypt, obtaining the decrypted netlist file based on the simulator view corresponding to the symbolic view, and simulating the integrated circuit diagram based on the decrypted netlist file.
One or more technical solutions provided in the embodiments of the present application at least have the following technical effects or advantages:
in the protection method for integrated circuit diagram design, for the circuit diagram view of each unit in the unit library which needs to be sent to the coordination terminal for integrated circuit diagram design, in order to avoid the specific design of the circuit diagram view of the unit acquired by the coordination terminal, the symbol view is created for each unit so as to replace the circuit diagram view to be displayed at the coordination terminal to achieve the purpose of hiding the circuit diagram view, meanwhile, in order to ensure that the created integrated circuit diagram can be simulated, the simulator netlist file exported by the circuit diagram view is encrypted to obtain an encrypted netlist file, when the coordination terminal simulates the integrated circuit diagram, the encrypted netlist file is called to be decrypted, and the decrypted netlist file is obtained based on the simulator view, so that the simulation of the integrated circuit diagram can be realized based on the decrypted netlist file. The present application does not provide circuit diagram views to the collaborators, and provides encrypted netlist files that are only available inside the corresponding simulator, and all of the viewing functions that allow display content are automatically disabled, as a result of being encrypted using the simulator encryption program, the file content is protected during use, thus ensuring that the electrical performance of the circuit is evaluated using the encrypted netlist files, but details of the design cannot be obtained by reverse, etc. Therefore, the present application solves the technical problem of the prior art lacking a protection scheme capable of reliably protecting the design of the integrated circuit diagram of the core.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a protection method for integrated circuit design according to an embodiment of the present application;
FIG. 2 is a circuit diagram of an inv2 unit according to an embodiment of the present application;
FIG. 3 is a symbolic view of an inv2 unit provided in accordance with one embodiment of the present application;
fig. 4 is a flowchart of a protection method for integrated circuit design according to a second embodiment of the present application.
Detailed Description
The embodiment of the application solves the technical problem that a protection scheme for the integrated circuit diagram design capable of reliably protecting a core is lacked in the prior art by providing the protection method for the integrated circuit diagram design.
The technical scheme of the embodiment of the application aims to solve the technical problems, and the overall thought is as follows:
in the protection method for integrated circuit diagram design, for the circuit diagram view of each unit in the unit library which needs to be sent to the coordination terminal for integrated circuit diagram design, in order to avoid the specific design of the circuit diagram view of the unit acquired by the coordination terminal, the symbol view is created for each unit so as to replace the circuit diagram view to be displayed at the coordination terminal to achieve the purpose of hiding the circuit diagram view, meanwhile, in order to ensure that the created integrated circuit diagram can be simulated, the simulator netlist file exported by the circuit diagram view is encrypted to obtain an encrypted netlist file, when the coordination terminal simulates the integrated circuit diagram, the encrypted netlist file is called to be decrypted, and the decrypted netlist file is obtained based on the simulator view, so that the simulation of the integrated circuit diagram can be realized based on the decrypted netlist file. The present application does not provide circuit diagram views to the collaborators, and provides encrypted netlist files that are only available inside the corresponding simulator, and all of the viewing functions that allow display content are automatically disabled, as a result of being encrypted using the simulator encryption program, the file content is protected during use, thus ensuring that the electrical performance of the circuit is evaluated using the encrypted netlist files, but details of the design cannot be obtained by reverse, etc. Therefore, the present application solves the technical problem of the prior art lacking a protection scheme capable of reliably protecting the design of the integrated circuit diagram of the core.
In order to better understand the above technical solutions, the following detailed description will refer to the accompanying drawings and specific embodiments.
Example 1
As shown in fig. 1, the present embodiment provides a protection method for integrated circuit diagram design, which is applied to a design end of a cell library, wherein the cell library comprises a plurality of cells, and each cell in the plurality of cells comprises a circuit diagram view scheme.
The design side of the cell library is the device side that creates a cell library and designs a circuit diagram view scheme for each cell involved in the cell library. The cell library herein refers to a library formed by bringing together certain cells in order to facilitate a certain function or process, and the specific arrangement of the cell library is not limited herein. In the following embodiments, a process reinforced cell library radLib is used for illustration, where the reinforced cell library radLib includes a plurality of cells such as inverters, NAND gates, registers, and comparators, and for convenience of illustration, an inv2 cell (inverter) in the radLib is used for illustration, as shown in FIG. 2, which shows a schematic diagram of the inv2 cell. The schematic view schematics of the individual cells under the cell library are stored in the cell library organization, as shown in table 1, which shows the storage of inv2 cells under the radLib cell library in the cell library organization.
Cell library Unit cell View(s)
radLib inv2 schematic
TABLE 1
The method comprises the following steps:
step S101: for each cell, a schematic view schema is used to derive a simulator netlist file.
It should be noted that, the circuit diagram view scheme is a visual view for interaction with a user, and generally shows all devices adopted by the unit, connection relationships of the devices and port information; the emulator netlist file is a code representation form corresponding to a circuit diagram view scheme, and represents all devices adopted by the unit, configuration information (such as device model numbers, specifications and quantity) of the devices, connection relations of the devices and port information in a code language.
As shown in Table 2 below, table 2 shows the emulator netlist file for the inv2 unit:
TABLE 1
Among them, subskt inv2 in out note: inv2 is the cell name, in is the input port of the inv2 cell, out is the output port of the inv2 cell.
xnm0 out in 0 nvstin 1 d8m=1l=180e-9w=1e-6 note: xnm0 the inv2 unit includes an NMOS device, and out in 0 0: the drain electrode of the NMOS tube is connected with the out end, the grid electrode is connected with the in end, the source electrode is connected with the ground, the body electrode is connected with the ground, nvstin 1d8 represents the model of the NMOS tube, m represents the number of the NMOS tubes, and l and w respectively represent the length and the width of the grid electrode of the NMOS tube.
xpm0 out in vdd-! vdd-! psbts1 d8m= l =180e-9w=1e-6 note: xpm0 represents that the inv2 unit comprises a device PMOS tube, out in vdd-! vdd-! The representation is: the drain electrode of the PMOS tube is connected with the out end, the grid electrode is connected with the in end, the source electrode is connected with the power supply and the body electrode is connected with the power supply, psbts1d8 represents the types of the PMOS tube, m represents the number of the PMOS tubes, and l and w represent the length and the width of the grid electrode of the PMOS tube.
Step S102: and encrypting the emulator netlist file by using an emulator encryption program to obtain an encrypted netlist file.
The simulator encryption program is an encryption program externally provided by the simulator, and different simulators are different in externally provided encryption program, but only the simulator has the function of decrypting the encryption program, in other words, the encrypted netlist file obtained by encrypting the simulator encryption program is only available inside the simulator, and all the viewing functions allowing display contents are automatically disabled. If someone tries to print the encrypted file, they will get unintelligible mess code, so the contents of the encrypted netlist file are protected during use, thus ensuring that the encrypted netlist file can be used to evaluate the electrical performance of the integrated circuit diagram, but its contents are kept secret. Since the encryption process is very secure, the original content cannot be reconstructed.
In the implementation process, two versions of simulation netlist files can be reserved at a design end, wherein the simulation netlist files are respectively as follows: an encrypted netlist file for use by the collaboration side and an original unencrypted emulator netlist file.
As shown in table 3 below, which shows the simulator netlist file of inv2 cells, the resulting encrypted netlist file after encryption using the meta encryption program:
TABLE 3 Table 3
As can be seen by comparing with table 2, the encrypted netlist file not only retains the name and port information of the inv2 unit, but also presents unintelligible messy codes as well as other information such as devices related to the unit, configuration information of the devices, connection relation and the like.
It should be noted that, the subkt text field is used to define a unit, specifically includes a name of the unit and port information of the unit, so as to establish a corresponding relationship between the encrypted netlist file and the unit, so that the encrypted netlist file is called according to the name of the unit and/or the port information of the unit, so as to perform simulation.
As an alternative embodiment, step S102 includes:
and encrypting the emulator netlist file by using an emulator encryption program corresponding to the emulator to obtain an encrypted netlist file.
As one example, when the simulator is an hspice simulator, the simulator netlist file is encrypted using a metaencrypter encryption program to obtain an encrypted netlist file. In the specific implementation process, the simulator netlist file can be encrypted by calling a metaencrypter encryption program through a command line 'metaencrypter-i netlist-o encrypter_netlist-t freellib'.
As one example, when the emulator is a select emulator, the emulator netlist file is encrypted using a select_encrypter encryption program to obtain an encrypted netlist file. In the implementation process, the simulator netlist file can be encrypted by calling a select_encrypter encryption program through a command line of select_encrypter-i netlist-o encrypted_netlist.
Step S103: a symbol view symbol is created for the cell.
As an alternative embodiment, the circuit diagram view schema includes the devices of the unit, the connection information of the devices, and the port information.
Step S103, including:
determining a view graph;
and replacing connection information among devices of the units in the circuit diagram view scheme by using the view diagram, and reserving port information to obtain a symbol view symbol.
In the implementation process, the view graph can be any graph, preferably, a graph commonly used in the technical field of the unit can be used as the view graph, for example, the inv2 unit adopts the graph shown in fig. 3 as the view graph, and then the graph is used for replacing the NMOS tube, the PMOS tube, the model, the specification, the number and the connection relationship in fig. 2, so that only external port information is reserved on the graph.
Step S104: a simulator view is created for the unit.
As an alternative embodiment, the circuit diagram view scheme includes the devices of the unit, the connection information of the devices, and the port information;
step S104, including:
acquiring port information of a unit;
based on the port information of the cell, a simulator view of the cell is generated.
In an implementation, the simulator view of the unit may include: both the specre simulator view and the hspiceD simulator view types may also include: an edo simulator view and a smartpice simulator view.
It should be noted that the role of the emulator view is: based on different requirements of different simulators on formats of netlist files in simulation, providing a basic template meeting the requirements of the simulators, so that after the encrypted netlist files are decrypted, generating decrypted netlist files meeting the simulation requirements of the simulators according to the basic template, and ensuring that the subsequent simulation work can be normally executed, for example: for the inv2 unit, the hspiceD simulator view is similar to the simulator netlist file provided in table 2, except that the positions of the devices, models, connection relations and other information needing to be kept secret, which are related to the simulator netlist file, are replaced by parameters to be filled, only port information is reserved, a template is formed, and the template is named by the simulator name, so that the simulator view is obtained. And when the cooperator end decrypts the encrypted netlist file to obtain the value of the parameter to be filled, filling the parameter to be filled of the simulator view to obtain the decrypted netlist file.
So far, the encrypted netlist file, the symbol view symbol and the simulator view of each unit in the unit library are obtained, and the symbol view symbol and the simulator view of each unit in the unit library are stored in a unit library organization structure, for example: the symbol view symbol and the simulator view of the inv2 unit are stored in the unit library organization structure shown in the table 1 to obtain the content of the table 4, and the corresponding relation among the unit, the symbol view symbol and the simulator view is established through the storage mode.
TABLE 4 Table 4
Step S105: and sending the encrypted netlist file, the symbol view symbol and the simulator view corresponding to each unit in the unit library to the cooperation end, so that the cooperation end creates an integrated circuit diagram by calling the symbol view symbol, and when simulating the integrated circuit diagram, calling the encrypted netlist file corresponding to the symbol view symbol to decrypt, obtaining the decrypted netlist file based on the simulator view corresponding to the symbol view symbol, and simulating the integrated circuit diagram based on the decrypted netlist file, wherein the simulator view is used for providing the file structure of the decrypted netlist file.
As an alternative embodiment, before step S105, further includes:
merging the encrypted netlist files corresponding to each unit in the unit library to obtain an encrypted library model file of the unit library;
transmitting the encrypted netlist file, the symbol view symbol and the simulator view corresponding to each unit in the unit library to a collaboration terminal, wherein the method comprises the following steps:
and sending the encrypted library model file and symbol view symbol and simulator view corresponding to each unit in the unit library to the collaboration terminal, so that the collaboration terminal calls the encrypted netlist file corresponding to the symbol view symbol from the encrypted library model file to decrypt, obtains the decrypted netlist file based on the simulator view corresponding to the symbol view symbol, and simulates the integrated circuit diagram based on the decrypted netlist file.
In this embodiment, taking an hspice format encrypted netlist file of each unit under a radLib unit library as an example, firstly, merging the encrypted netlist files of each unit to obtain an encrypted library model file rad_encrypt.lib of the radLib unit library, and then respectively adding sentences ". Librad" and ". Endl rad" in front of and behind the encrypted library model file rad_encrypt.lib; after the addition is completed, the encryption library model file rad_encryption. Lib is saved.
It should be noted that, in this embodiment, the data provided for the collaboration terminal includes only symbol view symbol of the unit, simulator view and generated encrypted library model file. The circuit diagram view scheme is not required to be provided and is reserved, so that the confidentiality effect is achieved.
After receiving the symbol view symbol and the simulator view corresponding to each unit in the encryption library model files rad_encrypter. Lib and radLib unit libraries, the collaboration terminal creates an integrated circuit diagram in a clicking or dragging mode by a user of the collaboration terminal, and when the symbol view symbol is called, the collaboration terminal can acquire the unit name corresponding to the symbol view symbol through a corresponding relation.
When a user at the collaboration end needs to simulate the integrated circuit diagram, if an hspice simulator is used for simulating, firstly, the sentence ". Lib 'rad_encrypt.lib' rad" can be used for loading the whole encryption library model file. Then, the collaboration terminal determines the simulator view according to the unit names corresponding to each symbol view symbol called by the integrated circuit diagram, searches the subekt file segment of each unit name from the encryption library model file rad_encrypt.lib, thereby determining the corresponding encryption netlist file, calls the encryption netlist file to decrypt, obtains the actual value of the parameters to be filled, continuously fills the simulator view, obtains the decrypted netlist file, and simulates the decrypted netlist file.
The technical scheme in the embodiment of the application at least has the following technical effects or advantages:
in the protection method for integrated circuit diagram design, for the circuit diagram view of each unit in the unit library which needs to be sent to the coordination terminal for integrated circuit diagram design, in order to avoid the specific design of the circuit diagram view of the unit acquired by the coordination terminal, the symbol view is created for each unit so as to replace the circuit diagram view to be displayed at the coordination terminal to achieve the purpose of hiding the circuit diagram view, meanwhile, in order to ensure that the created integrated circuit diagram can be simulated, the simulator netlist file exported by the circuit diagram view is encrypted to obtain an encrypted netlist file, when the coordination terminal simulates the integrated circuit diagram, the encrypted netlist file is called to be decrypted, and the decrypted netlist file is obtained based on the simulator view, so that the simulation of the integrated circuit diagram can be realized based on the decrypted netlist file. The present application does not provide circuit diagram views to the collaborators, and provides encrypted netlist files that are only available inside the corresponding simulator, and all of the viewing functions that allow display content are automatically disabled, as a result of being encrypted using the simulator encryption program, the file content is protected during use, thus ensuring that the electrical performance of the circuit is evaluated using the encrypted netlist files, but details of the design cannot be obtained by reverse, etc. Therefore, the present application solves the technical problem of the prior art lacking a protection scheme capable of reliably protecting the design of the integrated circuit diagram of the core.
Example two
As shown in fig. 4, the present embodiment provides a protection method for integrated circuit diagram design, applied to a collaboration terminal, the method includes:
step S201: the method comprises the steps of receiving a data packet of a cell library sent by a design end, wherein the cell library comprises a plurality of cells, the data packet comprises an encrypted netlist file, a symbol view symbol and a simulator view corresponding to each cell in the cells, the encrypted netlist file is a result of the design end encrypting the simulator netlist file by using a simulator encryption program after the simulator netlist file is derived through a circuit diagram view scheme of the cell, the symbol view symbol is a view created by the design end based on the circuit diagram view scheme of the cell, and the simulator view is a view created by the design end based on the circuit diagram view scheme of the cell.
Step S202: and in response to a first operation of a user, invoking a symbol view symbol corresponding to at least one unit in the plurality of units to create an integrated circuit diagram.
In the implementation process, the first operation of the user may be clicking, dragging, and other operation modes of the symbol view symbol.
Step S203: and responding to a second operation of the user, calling the encrypted netlist file corresponding to the symbol view symbol to decrypt, obtaining a decrypted netlist file based on a simulator view corresponding to the symbol view symbol, and simulating the integrated circuit diagram based on the decrypted netlist file, wherein the simulator view is used for providing a file structure of the decrypted netlist file.
In the implementation process, the second operation of the user may be an operation manner such as clicking on a simulation button of the integrated circuit diagram provided on the interface.
As an alternative embodiment, the data packet includes: the encryption library model file is a result of merging the encryption netlist file corresponding to each unit in the unit library by a design end;
step S203 includes:
and calling an encrypted netlist file corresponding to the symbol view symbol from the encrypted library model file to decrypt, obtaining a decrypted netlist file based on the simulator view corresponding to the symbol view symbol, and simulating an integrated circuit diagram based on the decrypted netlist file.
The technical scheme in the embodiment of the application at least has the following technical effects or advantages:
in the protection method for integrated circuit diagram design, for the circuit diagram view of each unit in the unit library related to the integrated circuit diagram design by the cooperation end, in order to avoid the specific design of the circuit diagram view of the unit acquired by the cooperation end, a symbol view is created for each unit to replace the circuit diagram view to be displayed at the cooperation end so as to achieve the purpose of hiding the circuit diagram view, meanwhile, in order to ensure that the created integrated circuit diagram can be simulated, an emulator netlist file derived from the circuit diagram is encrypted to obtain an encrypted netlist file, when the cooperation end simulates the integrated circuit diagram, the encrypted netlist file is called to decrypt, and the decrypted netlist file is obtained based on the emulator view, so that the simulation of the integrated circuit diagram can be realized based on the decrypted netlist file. The present application does not provide circuit diagram views to the collaborators, and provides encrypted netlist files that are only available inside the corresponding simulator, and all of the viewing functions that allow display content are automatically disabled, as a result of being encrypted using the simulator encryption program, the file content is protected during use, thus ensuring that the electrical performance of the circuit is evaluated using the encrypted netlist files, but details of the design cannot be obtained by reverse, etc. Therefore, the present application solves the technical problem of the prior art lacking a protection scheme capable of reliably protecting the design of the integrated circuit diagram of the core.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (8)

1. A method of protecting a circuit diagram design of an integrated circuit, the method being applied to a design side of a cell library, the cell library comprising a plurality of cells, each of the plurality of cells comprising a circuit diagram view, the method comprising:
deriving a simulator netlist file from the circuit diagram view for each of the cells;
encrypting the emulator netlist file by using an emulator encryption program to obtain an encrypted netlist file;
creating a symbolic view for the cell;
creating a simulator view for the cell;
and sending the encrypted netlist file, the symbolic view and the simulator view corresponding to each unit in the unit library to a cooperation end, so that the cooperation end creates an integrated circuit diagram by calling the symbolic view, and when simulating the integrated circuit diagram, calling the encrypted netlist file corresponding to the symbolic view to decrypt, obtaining a decrypted netlist file based on the simulator view corresponding to the symbolic view, and simulating the integrated circuit diagram based on the decrypted netlist file, wherein the simulator view is used for providing the file structure of the decrypted netlist file.
2. The method of protecting an integrated circuit schematic design as in claim 1, wherein the schematic view includes devices of the unit, connection information of the devices, and port information;
the creating a symbolic view for the unit includes:
determining a view graph;
and replacing the device of the unit and the connection information of the device in the circuit diagram view by using the view graph, and reserving the port information to obtain the symbol view.
3. The method of protecting an integrated circuit schematic design as in claim 1, wherein the schematic view includes port information for the cell;
the creating a simulator view for the unit includes:
acquiring port information of the unit;
based on the port information of the cell, an emulator view of the cell is generated.
4. The method of claim 1, wherein,
and when the emulator netlist file is an hspice netlist file, encrypting the emulator netlist file by using a metaencrypter encryption program to obtain the encrypted netlist file.
5. The method of claim 1, wherein when the emulator netlist file is a select netlist file, encrypting the emulator netlist file using a select_encrypter encryption program to obtain the encrypted netlist file.
6. The method for protecting an integrated circuit schematic design as in claim 1, wherein before said sending said encrypted netlist file, said symbolic view, and said emulator view corresponding to said each cell in said cell library to a collaboration site, further comprises:
merging the encrypted netlist files corresponding to each unit in the unit library to obtain an encrypted library model file of the unit library;
the sending the encrypted netlist file, the symbolic view and the simulator view corresponding to each unit in the unit library to a collaboration terminal includes:
and sending the encrypted library model file and the symbol view and the simulator view corresponding to each unit in the unit library to the collaboration terminal, so that the collaboration terminal calls the encrypted netlist file corresponding to the symbol view from the encrypted library model file to decrypt, obtains the decrypted netlist file based on the simulator view corresponding to the symbol view, and simulates the integrated circuit diagram based on the decrypted netlist file.
7. A method for protecting a circuit diagram design of an integrated circuit, the method being applied to a collaboration terminal, the method comprising:
receiving a data packet of a cell library sent by a design end, wherein the cell library comprises a plurality of cells, and the data packet comprises an encrypted netlist file, a symbol view and a simulator view corresponding to each of the cells, wherein the encrypted netlist file is a result of encrypting the simulator netlist file by using a simulator encryption program after the design end derives the simulator netlist file through the circuit diagram view of the cells;
in response to a first operation of a user, invoking the symbol view corresponding to at least one of the plurality of units to create an integrated circuit diagram;
and responding to the second operation of the user, calling the encrypted netlist file corresponding to the symbolic view to decrypt, obtaining a decrypted netlist file based on the simulator view corresponding to the symbolic view, and simulating the integrated circuit diagram based on the decrypted netlist file, wherein the simulator view is used for providing a file structure of the decrypted netlist file.
8. The method of protecting an integrated circuit schematic design as in claim 7, wherein the data packet comprises: the encryption library model file is a result of merging the encryption netlist file corresponding to each unit in the unit library by the design end;
the step of calling the encrypted netlist file corresponding to the symbolic view to decrypt, obtaining a decrypted netlist file based on the simulator view corresponding to the symbolic view, simulating the integrated circuit diagram based on the decrypted netlist file, and comprising the following steps:
and calling the encrypted netlist file corresponding to the symbolic view from the encrypted library model file to decrypt, obtaining the decrypted netlist file based on the simulator view corresponding to the symbolic view, and simulating the integrated circuit diagram based on the decrypted netlist file.
CN202010876777.XA 2020-08-27 2020-08-27 Protection method for integrated circuit diagram design Active CN112052465B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010876777.XA CN112052465B (en) 2020-08-27 2020-08-27 Protection method for integrated circuit diagram design

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010876777.XA CN112052465B (en) 2020-08-27 2020-08-27 Protection method for integrated circuit diagram design

Publications (2)

Publication Number Publication Date
CN112052465A CN112052465A (en) 2020-12-08
CN112052465B true CN112052465B (en) 2024-04-05

Family

ID=73600508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010876777.XA Active CN112052465B (en) 2020-08-27 2020-08-27 Protection method for integrated circuit diagram design

Country Status (1)

Country Link
CN (1) CN112052465B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113420304A (en) * 2021-05-21 2021-09-21 巨霖(上海)微电子有限公司 Encryption and decryption method, device and computer readable medium for SPICE netlist and model

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299223A (en) * 2008-06-19 2008-11-05 中兴通讯股份有限公司 Emulation method and device of high speed serial duct receiver balance

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299223A (en) * 2008-06-19 2008-11-05 中兴通讯股份有限公司 Emulation method and device of high speed serial duct receiver balance

Also Published As

Publication number Publication date
CN112052465A (en) 2020-12-08

Similar Documents

Publication Publication Date Title
CN102708336B (en) Method and system for electronic document processing based on separation of key data from customized template
CN104331294B (en) A kind of visualization procedure generation method and device
CN112052465B (en) Protection method for integrated circuit diagram design
CN109213480A (en) A kind of method, storage medium, equipment and system for developing the back-stage management page
CN108804091A (en) A kind of software code generation method
CN113420304A (en) Encryption and decryption method, device and computer readable medium for SPICE netlist and model
Nagel The life of SPICE
CN101425011A (en) Graphic scene case script editing system and method
Meza Moreno et al. Interactive multilingual web applications with grammatical framework
Elouali et al. A model-based approach for engineering multimodal mobile interactions
Childs Literate programming, a practioner’s view
McDermid Safety arguments, software and system reliability
Ali LP Based Integration of Computer Network and Security in University College
Moni Bora et al. Parametric modelling of needle-tissue interaction using finite element analysis
Chen et al. Interaction design & children toolkit
CN108776737A (en) The method of calibration of X-Y scheme and graphics in a kind of chemical pipeline
Stenius et al. Transient analysis of circuits including frequency-dependent components using transgyrator and convolution
Citrin Design considerations for a visual language for communications protocol specifications
Reyterou Requirements quality in the incremental design processes: problems and perspectives.
Russo Fotomodellazione 2020. Viaggio di sola andata?
Fröhlich et al. A logic-based framework for database repairs
Artamonova et al. Academic writing for IT students
Öktem Program package for analysis and design of control system.
Romlee et al. Usability evaluation of teacher service record book system (EBRP)
Malewski et al. Towards interactive geodata analysis through a combination of Domain-Specific Languages and 3D geo applications in a web portal environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant