CN1405678A - Enciphering method for externally hung software of integrated circuit - Google Patents

Enciphering method for externally hung software of integrated circuit Download PDF

Info

Publication number
CN1405678A
CN1405678A CN 02134995 CN02134995A CN1405678A CN 1405678 A CN1405678 A CN 1405678A CN 02134995 CN02134995 CN 02134995 CN 02134995 A CN02134995 A CN 02134995A CN 1405678 A CN1405678 A CN 1405678A
Authority
CN
China
Prior art keywords
function
software
integrated circuit
encryption
control software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 02134995
Other languages
Chinese (zh)
Inventor
吴坦
Original Assignee
陈少鹏
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 陈少鹏 filed Critical 陈少鹏
Priority to CN 02134995 priority Critical patent/CN1405678A/en
Publication of CN1405678A publication Critical patent/CN1405678A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The control software of the integrated circuit (IC) such as the CPU or the micro controller unit (MCU) is constituted in the external-hanging mode. The external-hanging software is encrypted by the function, and the relevant inverse function is built in the IC in order to decrypt the software. Thus, since the control software is as the external-hanging software, the stock category can be simplified and the cost can be reduced. Moreover, the external-hanging control software can obtain the related protection from the encrypting/decrypting measure.

Description

The encryption method of externally hung software of integrated circuit
Technical field
The present invention system is about a kind of encryption method of externally hung software of integrated circuit, refers to especially a kind ofly be used for the method for the measures for encryption/decryption between CPU/MCU and its plug-in Control Software with function/inverse function reduction principle.
Background technology
After the exploitation unit finished software product based on CPU/MCU, unless employing specialized hardware (as ASIC), then software copyright became its unique intellectual property that can effectively have.Thereby each exploitation unit all is devoted to the maintenance of copyright.As being analyzed with regard to technological layer, someone makes firmware (Firmware) with software, the condition of utilizing CPU/MCU manufacturing plant to provide, it is sealed up for safekeeping within chip, but in actual applications, because each developer's product difference, its corresponding software size are also different, so that required storage element capacity is also different.Therefore the factory of CPU/MCU to a kind of CPU/MCU core, must be equipped with the storage element of different sizes in order to adapt to the demand in market on chip.Cause the type of inventories various, problems such as cost raising.
From the above, Control Software directly being sealed up for safekeeping in integrated circuit with form of firmware is to have variety of problems such as cost height, the type of inventories are many.Thereby, with the Control Software of CPU/MCU plug-in be admissible another direction.The actual programming of depositing is an example in the storage element with computer inside; be used for the computer that data operation is handled; because programming is huge; so be stored on its hard disk more; and be controlled to be the computer of major function with formula; mostly formula is cured as firmware (Firmware), direct burning is in the plug-in storage chip that the built-in storage element of CPU/MCU or its periphery have power-off protection.Yet, it all is standard that mode is gone in the output of any storage chip, during its reading of data, system is added on certain one-address code respectively on the address bus with suitable high electronegative potential according to certain time sequence, and the pairing storage monomer in this address (Cell) content is appeared on the data bus according to certain time sequence.Because this is a kind of universal standard process, is maintained secrecy so the content of storage chip can't rely on existing universal architecture.
This shows that although plug-in mode can increase the elasticity of software development, and the product of minimizing CPU/MCU supply factory is all kinds of, privacy problem still influences the wish that the software developer adopts externally hung software.Because externally hung software dealer's rights and interests can be subjected to the infringement of dual mode usually.First kind is directly counterfeit.Because the general CPU/MCU of the many employings of electronic product, so the counterfeiter only needs in open market purchase to identical CPU/MCU, to want the content of storage chip plug-in in the counterfeit product to be copied then, among the burned more universal storage chip of providing for oneself, can produce counterfeit product voluntarily.Second kind is to steal function code (form normally collects).Because plug-in software all is to write for universal cpu/MCU at present, as long as it is read, through the deciphering of inverse assembler, just the machine code that can easily CPU/MCU be used (mode with 0 and 1 exists) is translated into the assembler code (definition according to IBM is commonly called as Assembly) that the programming personnel can understand and is reached the purpose of stealing the function secret.
Summary of the invention
Fundamental purpose of the present invention can be set up privacy mechanism at the CPU/MCU externally hung software providing a kind of, adopts for CPU/MCU production firm, to guarantee the encryption method of software development dealer rights and interests.
Technical scheme of the present invention is such, a kind of encrypting and decrypting method of externally hung software of integrated circuit, the integrated circuit that makes tool carry out the Control Software function stores its Control Software in plug-in mode, it is characterized in that: plug-in Control Software, elder generation is through the processing of an encryption function, again by burning on general storage chip, establish a decryption unit based on the inverse function of aforementioned functions at IC interior again, specially department's function that the Control Software of having encrypted that reads on the storage chip outside plug-in is decrypted.
The theoretical foundation of this encryption protecting method is as follows.
By as can be known aforementioned, the required protection of development company be the software of its design.This software when exploitation finishes normally with the executable file of 16 systems or similarly form exist, wait for by burning on storage chip.Its content is according to present custom, and outer is to form with the pattern of byte or word, and each byte contains 8 bit, and each word then according to used CPU/MCU difference, can contain 8,12,13,14,15,16 or even more a plurality of bit do not wait.In addition because these byte or word respectively occupy certain sorting position in file, these positions just corresponding to them by the hardware address of burning in storage chip.So a certain hereof position An (its numerical value=n), just have the content of Dn.
Because D is the final executable file content of developing after finishing, and is to exist with universal type, the convenient plagiarism is so the exploitation commercial city is want it is changed into uncurrent form.But the performance element of CPU/MCU only is familiar with the content of this universal standard, does not allow to change.So the present invention will propose major technology means exactly, can satisfy both demands simultaneously.
From the theory of mathematical function, when a function had satisfied some specific condition, it just had inverse function to exist.Suppose that F is such function, then its inverse function G just has following characteristic.
G=F -1
G·F=F -1·F=I
At this I is the Identity function, no matter act on any data, its output is identical with input forever.
To a general executable file D, if with it as input data (implied quote its content Dn and pairing address An at this), through the operation of encryption function, just can obtain an executable file D ' through encryption.This file has not been a standard type, nor can be carried out by the CPU/MCU core of standard.The mathematic(al) mode of this process is as follows:
D′=F(D)
This when the developer with D ' burning file on plug-in storage chip, just can not plagiarized easily.The new problem but this has also derived is exactly how to allow the CPU/MCU core carry out this file.
In order to carry out encrypt file D ', before calculation process and performance element, must realize inverse function G on the CPU/MCU chip with hardware mode.In the process of implementation, when the content D ' of D ' file n (implicit its address An) was sent to G as the input data, the operation of function G can make it be reduced into executable file D, is admitted to calculation process and performance element again, carries out according to the standard formula.The mathematic(al) mode of this process is as follows:
G(D′)=F -1(F(D))=I(D)=D
This whole process makes the formula that exposes to the open air on plug-in storage chip exist with off-gauge mode D ' on the one hand, and has been subjected to protection.For the performance element of CPU/MCU, it can read execute file D in real time and accurately, and finishes the work, and has safeguarded design function on the other hand.
Because different manufacturers can select for use different encryptions (F)/deciphering (G) function right, occur with diverse non-standard pattern again, more strengthened (protecting) function of maintaining secrecy so encrypt execute file D '.And each F/G group of functions also can be done dynamic encryption according to the address An in the input data when putting into practice, and makes the possibility that is cracked reduce by a larger margin.If CPU/MCU producer is ready further effort, more can be provided at the ability of instant dynamic encryption on the production line for the developer, further ensured intellecture property again.
Description of drawings
For further specifying aforementioned purpose and the present invention's technology characteristic, attached now with graphic detailed description as the back:
Fig. 1 is the present invention's calcspar.
Fig. 2 produces the process flow diagram of encryption executable file for the present invention.
Fig. 3 represents with Iso or (XOR) a kind of the poster processing soft content of function encrypting (cooperate with embodiment one) with " class " C linguistic form for the present invention.
Fig. 4 for the present invention with Iso or (XOR) constitute a kind of hardware structure synoptic diagram (cooperating embodiment one) of decryption function " G " (inverse function of " F " function).
Fig. 5 represents another the poster processing soft content (cooperating embodiment two) of encrypting with the bit displacement function with " class " C linguistic form for the present invention.
Fig. 6 constitutes another hardware structure synoptic diagram (cooperating embodiment two) of decryption function " G " (inverse function of " F " function) with data bus bit displacement for the present invention.
Fig. 7 is the present invention's another hardware configuration synoptic diagram with array mode setting decryption function, and this figure only is one of possible array mode.
Fig. 8 is a kind of decryption function parameter setting mode synoptic diagram of hardware shown in Figure 7.
Fig. 9 plants decryption function parameter setting mode synoptic diagram for other of hardware shown in Figure 7.
Figure 10 plants decryption function parameter setting mode synoptic diagram for other of hardware shown in Figure 7.
Figure number part (10) integrated circuit (12) demoder (11) calculation process and formula performance element (13) address generator (14) data bus (15) address bus (16) contact switch unit (17) logic lock (31) (32) parameter setting unit (310) (320) control line
When practical application, the developer of firmware (Firmware), the development platform of facing a kind of CPU/MCU stylizes, finish the version of the tight test of a process later on through all soft project steps, that is can burning advance the programming file of chip, this programming file is the compositional language the carried out instruction of forming with the binary bit machine code, yet for storage chip, aforesaid compositional language instruction also is a kind of data of broad sense, after chip is advanced in its burning, just there is a corresponding instruction (or data of broad sense) each address location in storage chip.If these data are to exist with general standard type, anyone all can be by reading it and give and duplicating in the storage chip according to certain procedure, share with the CPU/MCU of standard then and make counterfeit product, so the developer is had no to ensure.Thereby the present invention utilizes mathematical method that these stereotyped commands (data) are encrypted, and deciphered before execution then, is major technique characteristic of the present invention place.
(the present invention's system schematic) as shown in Figure 1, it is to have the integrated circuit (10) (as CPU/MCU) of carrying out the formula function by one to link a general storage chip (20) that stores Control Software in plug-in mode; Wherein, this integrated circuit (10) includes a calculation process and formula performance element (11), a demoder (12) and an address generator (13) at least; This calculation process and formula performance element (11) remove and see through demoder (12), data bus (14) is connected with storage chip (20), are connected with storage chip (20) through address generator (13), address bus (15) again.By this, this calculation process and formula performance element (11) can see through address generator (13) and produce the storage chip address of desiring reading of data, deliver to storage chip (20) via address bus (15), storage chip (20) is sent the Control Software data of corresponding address back to integrated circuit (10) via data bus, delivers to calculation process and formula performance element (11) and carry out after demoder (12) is made decoding processing.
Owing to do encryption by encryption function before the Control Software burning in the storage chip (20), read even see through general procedure, also can't understand its actual content, so can reach the purpose of protection software creation.This encrypted Control Software is decrypted through demoder (12) earlier, so do not influence the execution of Control Software before the calculation process of delivering to integrated circuit (10) and formula performance element (11) execution again.Because decryption function is directly to insert in the integrated circuit (10), the stranger also has no way of obtaining or cracking.
Relevant aforesaid encrypting/decrypting method, sincerely be described in further detail as:
According to the characteristic of software and storage storage chip, the binary bit mode that the content of software can be following is represented:
D n=d k-1,nd k-2,n…d 1,n?d 0,n
A n=a j-1,na j-2,n…a 1,n?a 0n
D in the preceding formula K-1, n, a J-1, nDeng representing other bit among the word, n represents the address, and its scope is from 0 to 2 J-1, wherein j is an integer.
D nBe to be positioned at address A nSoftware content, for system's (being that each word contains K bits) that K-bit is wide, available binary bit mode is represented, as d (k-1), nd (k-2), nD 1, nd 0, nd (k-1), nThe highest bit of representative, d 0.nRepresent minimum bitA nBe D nThe address at place, if the address starting point is 0, A then n=n, its also available binary bit mode is represented, as a (j-1), na (j-2), nA 1, na 0,1a (j-1), nThe highest bit of expression, a0, n represent minimum bit
For encrypting, so select the function " F " that can operate the binary bit system for use, it has satisfied the characteristic with inverse function " G ", and its mathematical notation is as follows:
G[F(D)]=F -1[F(D)]=I(D)=D
But executive software is carried out encrypted process system as shown in Figure 2, and the user can will finish the standard software D of test, and it is as follows to obtain encryption function via the function processing:
D′=F(D)
This new encryption can be carried out formula D ', just can wait application by burning on plug-in storage chip.At this, the most reasonable approach is that encryption function is embedded on the PC in the executable packing software.Certainly also have other available method, but cost may be higher.Because this software is monitored by developer oneself, and can work out inner parameter voluntarily, so encrypt/decrypt group of functions chance stolen or that crack is extremely low.Under the situation of not knowing the encrypt/decrypt function,, still can't crack the content of true form even because the content of reading D ' file from plug-in storage chip.
When carrying out, promptly shown in Figure 1 as described above, add a contrafunctional demoder (12) in the integrated circuit (10), following reducing action, take place when being provided with the demoder (12) of deciphering G function in the D ' encrypt file that is read in by plug-in storage chip (20):
G(D′)=G[F(D)]=F -1[F(D)]=I(D)=D
Thereby deliver to the former executive software D that begins that is still that calculation process and formula performance element (11) carry out.
For ease of understanding, below will be further described through the specific embodiment of two simplification:
Embodiment one (logical operation function encrypting)
At first, in first Application Example, be that the system with a 8bit is an example, select for use Iso that address bus and data bus are matched or (XOR) computing as encryption function, that is
D′=F(D)=XOR(A,D)
At this, D is the close formula of carrying out of desire protection, and A is the corresponding address set that can carry out formula D other content.F be one with a 0To d 0, a 1To d 1... a 7To d 7, the bit matching method carries out Iso or (XOR) logical operation function, and its inverse function G then is
G(D′)=XOR(A,D′)=D
Suitable identical with the F function
But suppose a to have developed the executive software D that finishes, wherein the address code of a certain content is 3C in 16 systems, and its data are the 6C of 16 systems, so the data of not encrypted are as with binary representation being
D n=01101100
Its address then is
A n=00111100
Through encryption function Iso or (XOR) after the computing then ciphered data be
D′ n=01010000
On storage chip (20), the address is A to this piece of data by burning nIn=00111100 the unit.
Use Iso again in the demoder (12) of integrated circuit (10) or (XOR) for deciphering inverse function G deciphers aforementioned data, then encrypted data are
D′ n=01010000
Corresponding address still is
A n=00111100
Through Iso or (XOR) after the computing, the content that calculation process and formula performance element (11) are received is
D n=01101100
But it is identical with original executive software content, so can carry out for normal.
The concrete technology contents of aforementioned encrypting/decrypting method sees also Fig. 3, and shown in 4, wherein Fig. 3 system represents to encrypt the poster processing soft of usefulness with " class " C linguistic form.Fig. 4 then is the hardware structure of decryption function " G " (inverse function of " F " function).
Must be pointed out that at this when practical application, the F/G group of functions is not limited to Iso or (XOR) a kind of, can need select exploitation according to the user.Even Iso or (XOR) function also be not limited to a 0With d 0, a 1With d 1A 7With d 7A kind of matching method.Other matching method can be complied with user-selected parameter setting.
Embodiment two (shift function encryption)
In this embodiment, be that the system with a 4bit is an example, select a kind of data content bit displacement mode as encryption function F, its method is as follows:
d 0→d 1
d 1→d 2
d 2→d 3
d 3→ d 0' its deciphering inverse function G is
d 0′→d 3
d 1′→d 0
d 2′→d 1
d 3′→d 2
Suppose that but having finished among the executive software D of test a certain location conten one is two-symbol 0101 (according to d 3d 2d 1d 0Series arrangement).That is:
D n=d n,3?d n,2?d n,1?d n,0=0101
After handling, obtain through the encryption software that embeds the F function
D n′=F(D n)=d′ n,3?d′ n,2?d′ n,1d′ n,0=1010
And by burning on storage chip (20).
After this content is integrated circuit (10) and reads in, through the processing of hardware (12) deciphering inverse function G and following variation takes place.
G(D′ n)=0101=D n
When calculation process and formula performance element (11) are received this part instruction, because of itself and original contents in full accord, so be able to smooth execution.
The concrete technology contents of aforementioned encrypting/decrypting method sees also Fig. 5, shown in Figure 6, and wherein Fig. 5 system represents the poster processing soft encrypted with shift function with " class " C linguistic form.Fig. 6 is then for being the hardware configuration of decryption function " G " (inverse function of " F " function) with the displacement method.
By above-mentioned mathematic(al) mode and all provable this encryption method simple and feasible of specific embodiment.For CPU/MCU manufacturing plant, can provide a the poster processing soft (PostProcessor) for the encryption formula in the storage chip that results from plug-in Control Software to the client, add a decryption hardware structure in the calculation process of integrated circuit (10) and the front end of formula performance element (11) then, embed deciphering contrafunctional demoder (12) as described above.This is encrypted must be supporting with hardware with software and deciphering, and the controlled variable of their selective usefulness also must be supporting.As for the input and the storage of controlled variable,, very convenient for encryption.Because ciphering process is to be carried out on the hardware of types such as PC by software fully.As long as, can achieve the goal so stay the window of parameter input.But for deciphering, difficulty relatively then is because of deciphering is that demoder (12) at the front end of CPU/MCU chip carries out, so parameter must and be stored on the chip with effective ways input.Again because enciphering/deciphering must have certain complicacy in case cracked by the people, so degree of adding to the difficulties further.Typical decryption hardware controlled variable input method following (its corresponding encryption software structure can be inferred thus).
As shown in Figure 7, point out a kind of deciphering inverse function parameter setting mode of example, in hardware, main system makes data bus (14) and address bus (15) be connected to a contact switch unit (Crosspoint) (16) jointly, this contact switch unit (Crosspoint) (16) output terminal connects a logic lock (17) again, and logic lock (17) output terminal system is connected to the data bus of calculation process and formula performance element (11); Wherein, this contact switch unit (Crosspoint) (16) is controlled via control line (310) (320) by a parameter setting unit (31) (32) respectively with logic lock (17).These two parameter setting unit (31) (32) can be used to set and note is deposited contrafunctional controlled variable.Available method has three kinds at present.
First method system is as two parameter setting unit (31) (32) in the working storage mode as shown in Figure 8.Other have the convenient user of write control circuit voluntarily the selected parameter of burning among two parameter setting unit (31) (32).Provide the poster processing soft that contains a plurality of encryption functions by manufacturer during enforcement, then provide the parameter setting unit (31) (32) that constitutes by technology such as EEPROM at hardware aspect, can before final products dispatch from the factory, write to select different decryption function and encryption function by the user.By this, the client can grasp maximum encryption elasticity and confidentiality, and its production cost is also higher relatively certainly.
Second method as shown in Figure 9, indivedual storage monomers (Cell) of system shilling aforementioned two parameter setting unit (31) (32) constitute contact with earth terminal GND, power supply VCC respectively, wait and then before dispatching from the factory, optionally burn earth terminal contact or power supply contact when setting inverse function, so can conveniently go up at demoder (12) and set different deciphering inverse function parameters at different clients with laser reconditioning method (Laser trim); The advantage of preceding method is low at cost, but the client can not freely select the encryption function parameter at any time.
The third method is that indivedual storage monomers (Cell) of shilling aforementioned two parameter setting unit (31) (32) are connected with ground end GND and power supply VCC via fuse as shown in figure 10.As the structure of programmable logic element (PLD).This method can allow the user before final products dispatch from the factory, to write yard device with the blowing of fuse selection, to reach the purpose of selecting different decryption function parameters.
As shown in the above description, there was the software development dealer that software is made firmware (Firmware) in the past, the condition that provides according to CPU/MCU manufacturing plant, seal up for safekeeping in integrated circuit, because of its production cost height, problems such as type of inventories complexity and user's elastic space are less have to consider towards plug-in mode.Yet softwares such as Control Software are stored in (ROM in the outer storage chip that is hung on outside the CPU/MCU, EEPROM, Flash etc.), though can improve the prostatitis shortcoming, but the creation of the software in the storage chip sees through general procedure and can read easily and give and duplicating, for the software development dealer, have no to ensure, so few dealer adopts.Through the principle of operation that the present invention utilizes mathematical function and inverse function to reduce, with function Control Software is encrypted, in CPU/MCU, then establish the inverse function hardware that takes up room less and deciphered.Because function and inverse function can be realized with selected voluntarily logical operation by the user, so be one to reach, can allow relieved Control Software is the plug-in and method that can effectively reduce cost of dealer easily.

Claims (12)

1. the encrypting and decrypting method of an externally hung software of integrated circuit, the integrated circuit that makes tool carry out the Control Software function stores its Control Software in plug-in mode, it is characterized in that: plug-in Control Software, elder generation is through the processing of an encryption function, again by burning on general storage chip, establish a decryption unit based on the inverse function of aforementioned functions at IC interior again, specially department's function that the Control Software of having encrypted that reads on the storage chip outside plug-in is decrypted.
2. the encrypting and decrypting method of externally hung software of integrated circuit according to claim 1 is characterized in that: described encryption function is one to have contrafunctional logical function; Be input as former Control Software (implicit its shared address of indivedual contents), be output as the Control Software of having encrypted, its decryption function is the inverse function of aforementioned encryption function.Be input as the aforesaid Control Software (implicit its pairing address of indivedual contents) of having encrypted, be output as as-reduced Control Software.
3. the encrypting and decrypting method of externally hung software of integrated circuit according to claim 1 is characterized in that: described encryption function is one to have contrafunctional bit displacement function.Be input as former Control Software (implicit its shared address of indivedual contents), be output as the Control Software of having encrypted, its decryption function is the inverse function of aforementioned encryption function.Be input as the aforesaid Control Software (implicit its pairing address of indivedual contents) of having encrypted, be output as as-reduced Control Software.
4. according to claim 1 or 2 or 3, the encrypting and decrypting method of described externally hung software of integrated circuit, it is characterized in that: the device of described encryption is with the software implementation of multi-purpose computer, selected encryption function is converted to multi-purpose computer, but executive software as PC etc., but this executive software is input with the Control Software data of required encryption, and may allow the user to import voluntarily or more selected encryption parameters, after operation, its output is the encryption Control Software, can burning on plug-in storage chip.
5. according to claim 1 or 2 or 3, the encrypting and decrypting method of described externally hung software of integrated circuit, it is characterized in that: the device of described encryption is implemented with soft, the hardware of special use, for selected encryption function is converted to special-purpose soft, hardware configuration, this structure is input with the Control Software data of required encryption, and have button, display screen, or computing machine communication interface, or both have concurrently as man-machine interface, after operation, its output is the encryption Control Software, can burning on plug-in storage chip.
6. according to claim 1 or 2 or 3, the encrypting and decrypting method of described externally hung software of integrated circuit.It is characterized in that: described decryption device is implemented with the dedicated hardware units that is incorporated on the integrated circuit, an integrated circuit, and it is made up of a calculation process and formula performance element, a demoder and an address generator at least; One outside storage chip stores Control Software on it, wherein demoder is to constitute with special circuit, and its possible composition can include reception switch unit (Crosspoint), logic lock circuit or other mathematical function circuit etc.; Parameter when it is carried out can determine when producing, and also can be determined when carrying out according to the parameter that the user compiles by control module; But anyway make up, its general function must be the inverse function of pairing encryption function, and this calculation process and formula performance element system see through demoder, and data bus is connected with storage chip, and again through address generator, address bus is connected with storage chip.
7. according to the encrypting and decrypting method of the described externally hung software of integrated circuit of claim 6, it is characterized in that: its composition of described decryption device can replace dedicated hardware units by the unit that can carry out microcode (Micro code); Might be non-the function carried out of specialized hardware, as receive switch unit (Crosspoint), the computing of logic lock, or the computing of other mathematical function, or their combination function, all can replace by carrying out microcode (Micro code), this unit also can allow the user to influence the execution of microcode in the mode of setup parameter.
8. according to the encrypting and decrypting method of claim 6 or 7 described externally hung software of integrated circuit, it is characterized in that: the composition of described decryption device can be by the part specialized hardware, partly microcode (Micro code) performance element is united formation, and also may allow the user to influence the mode of execution in the setup parameter mode.
9. according to the encrypting and decrypting method of claim 6 or 7 or 8 described externally hung software of integrated circuit, it is characterized in that: described decryption device influences its execution as allowing the user with parameter mode, these system of parameters utilize software mode to write not to be subjected to cut off the power supply among the register that influences, be able to long preservation, and the register (non-volatile) that these are not cut off the power supply influences is embedded in IC interior.
10. according to the encrypting and decrypting method of the described externally hung software of integrated circuit of claim 9, it is characterized in that: described each bit that is not subjected to outage to influence (non-volatile) register is respectively replaced by a resistive element and a resistive element that is pulled down to earth terminal GND that is pulled to power supply VCC on chip, the method of selected parameter be by CPU/MCU manufacturer before encapsulation, can laser reconditioning method (Laser Trim) be blown by one of them connection of each bit, make it become fixing " 0 " or " 1 ".Can distinguish with different combinations different clients.
11. the encrypting and decrypting method according to the described externally hung software of integrated circuit of claim 10 is characterized in that: upward increase the fuse cell structure on the connecting line of drop-down resistive element in described, and on chip, increase the programming Control circuit of selectivity blown fuse.Arrangement can allow the software developer behind the intact encryption software of burning like this, utilizes and writes yard device according to the selected fuse that designs, blows on the CPU/MCU, sets the purpose of answering parameter and reach.
12. encrypting and decrypting method according to claim 1 or 2 or 3 or 4 or 5 or 6 or 7 or 8 or 9 or 10 or 11 described externally hung software of integrated circuit.Wherein enciphering/deciphering function/contrafunctional final selection is by the parameter of setting the poster processing soft or hardware, determine with setting the decoder parameters on the CPU/MCU, the selection of this parameter must be able to guarantee function and contrafunctional indivisible relation between ciphering process and the decrypting process, and this assurance can be realized by a form of presetting or the formula that develops according to mathematical formulae.
CN 02134995 2002-10-22 2002-10-22 Enciphering method for externally hung software of integrated circuit Pending CN1405678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02134995 CN1405678A (en) 2002-10-22 2002-10-22 Enciphering method for externally hung software of integrated circuit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02134995 CN1405678A (en) 2002-10-22 2002-10-22 Enciphering method for externally hung software of integrated circuit

Publications (1)

Publication Number Publication Date
CN1405678A true CN1405678A (en) 2003-03-26

Family

ID=4747987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02134995 Pending CN1405678A (en) 2002-10-22 2002-10-22 Enciphering method for externally hung software of integrated circuit

Country Status (1)

Country Link
CN (1) CN1405678A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031931B (en) * 2004-09-28 2011-01-26 意法半导体有限公司 Method for locking an integrated circuit
CN102339369A (en) * 2011-08-18 2012-02-01 珠海天威技术开发有限公司 MCU (Micro-programmed Control Unit) information protection method
CN107729723A (en) * 2017-11-08 2018-02-23 深圳市希顿科技有限公司 A kind of integrated circuit burning program method and programming system
CN112884364A (en) * 2021-03-19 2021-06-01 珠海迈科智能科技股份有限公司 Production method for sharing same machine type by multiple client software
CN114203245A (en) * 2022-02-18 2022-03-18 深圳市芯茂微电子有限公司 eFuse control method and related assembly

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031931B (en) * 2004-09-28 2011-01-26 意法半导体有限公司 Method for locking an integrated circuit
CN102339369A (en) * 2011-08-18 2012-02-01 珠海天威技术开发有限公司 MCU (Micro-programmed Control Unit) information protection method
CN107729723A (en) * 2017-11-08 2018-02-23 深圳市希顿科技有限公司 A kind of integrated circuit burning program method and programming system
CN107729723B (en) * 2017-11-08 2023-07-04 深圳市希顿科技有限公司 Integrated circuit program burning method and burning system
CN112884364A (en) * 2021-03-19 2021-06-01 珠海迈科智能科技股份有限公司 Production method for sharing same machine type by multiple client software
CN114203245A (en) * 2022-02-18 2022-03-18 深圳市芯茂微电子有限公司 eFuse control method and related assembly

Similar Documents

Publication Publication Date Title
US7882355B2 (en) Encryption/decryption methods and devices utilizing the same
US4278837A (en) Crypto microprocessor for executing enciphered programs
US8543838B1 (en) Cryptographic module with secure processor
CN1242323C (en) Disorder source program, souce program conversion method and equipment, and source conversion program
TWI662474B (en) Method and apparatus for performing firmware programming on microcontroller chip, and associated microcontroller chip
CN1495620A (en) Semiconductor device with encrypted part or external interface and content reproducing method
US20140037093A1 (en) Method of managing key for secure storage of data and apparatus therefor
TWI552017B (en) Secure data storage device and system and data writing and read methods thereof
CN1122213C (en) Method and apparatus for signing and sealing objects
CN1647443A (en) Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
CN1914849A (en) Trusted mobile platform architecture
CN101484905A (en) Method and system to provide security implementation for storage devices
US7512239B2 (en) Protection key for hardware and information management system
CN103221961A (en) Method and apparatus including architecture for protecting multi-ser sensitive code and data
CN102117387A (en) Secure key access device and applications thereof
CN1421000A (en) Generating key hierarchy for use in isolated execution environment
CN1399235A (en) Deciphering equipment with enciphering unit and message and its making process
CN1714330A (en) Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module
TWI747007B (en) Configurable security memory region
JP2009163284A (en) Processor apparatus
CN1961301A (en) Apparatus and method for operating plural applications between portable storage device and digital device
CN1734475A (en) Semiconductor integrated circuit and information processing apparatus
KR102588600B1 (en) Data Storage Device and Operation Method Thereof, Storage System Having the Same
CN103246832A (en) Microprocessor chip with anti-copy function and recording system thereof
CN1967482A (en) Program development method, program development supporting system, and program installation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication