TWI480735B - Micro-processor with an anti-copy function, chip programming system thereof and electronic device - Google Patents

Micro-processor with an anti-copy function, chip programming system thereof and electronic device Download PDF

Info

Publication number
TWI480735B
TWI480735B TW101104635A TW101104635A TWI480735B TW I480735 B TWI480735 B TW I480735B TW 101104635 A TW101104635 A TW 101104635A TW 101104635 A TW101104635 A TW 101104635A TW I480735 B TWI480735 B TW I480735B
Authority
TW
Taiwan
Prior art keywords
storage unit
garbled
value
unit
encrypted data
Prior art date
Application number
TW101104635A
Other languages
Chinese (zh)
Other versions
TW201333702A (en
Inventor
Chieh Sheng Tu
Original Assignee
Nuvoton Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuvoton Technology Corp filed Critical Nuvoton Technology Corp
Priority to TW101104635A priority Critical patent/TWI480735B/en
Priority to CN201210128403.5A priority patent/CN103246832B/en
Publication of TW201333702A publication Critical patent/TW201333702A/en
Application granted granted Critical
Publication of TWI480735B publication Critical patent/TWI480735B/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

具有防複製功能的微處理器晶片及其晶片燒錄系統與電子裝置Microprocessor chip with anti-copy function and its chip burning system and electronic device

本發明係有關於一種微處理器晶片,特別是有關於一種具有防複製功能的微處理器晶片。This invention relates to a microprocessor chip, and more particularly to a microprocessor chip having an anti-copy function.

電子資訊產品大多數都有微處理器晶片。微處理器晶片具有一中央處理器以及一記憶體。晶片製造商或晶片設計商在每一微處理器晶片晶片燒錄過程會將一引導程式燒錄(loader program)至記憶體(ROM)之中,簡稱LDROM,例如基本輸入輸出系統(Basic Input Output System,BIOS),而使用者會將使用者程式(application program)燒錄至另一記憶體(ROM)之中,簡稱APROM,在燒錄過程之中,為了防止競爭者破解盜拷,大部分會在晶片燒錄時在LDROM內燒錄一鎖碼參數(lock bit),防止破解盜拷,然而單一鎖碼參數係非常容易被破解的,而且只要破解其中一顆就可以適用全部的相關產品。中央處理器所執行的程式碼通常放在記憶體中。因此,微處理器晶片內的程式碼的防拷是很重要的然而,現今複製工具的進步與方便,使得花費數月研發的程式碼或版權資料,還來不及申請專利,可能就在瞬間被複製並大量製造,使得研發廠商受到相當大的損失。Most electronic information products have microprocessor chips. The microprocessor chip has a central processing unit and a memory. The wafer manufacturer or chip designer will load a bootloader program into the memory (ROM) during each microprocessor chip wafer burning process, referred to as LDROM, such as Basic Input Output. System, BIOS), and the user will burn the user program (application program) into another memory (ROM), referred to as APROM, in the process of burning, in order to prevent competitors from cracking the copy, most A lock bit parameter (lock bit) is burned in the LDROM during the burning of the chip to prevent cracking and copying. However, the single lock code parameter is very easy to be cracked, and all the related products can be applied as long as one of them is cracked. . The code executed by the central processor is usually placed in memory. Therefore, the copy protection of the code in the microprocessor chip is very important. However, the progress and convenience of the copying tool today make the code or copyright material that has been developed for several months, and it is too late to apply for a patent, and may be copied in an instant. And a large number of manufacturing, resulting in considerable losses for developers.

本發明提供一種具有防複製功能的微處理器晶片,包括一亂碼產生單元、一加密單元、一儲存單元模組以及一控制單元。亂碼產生單例,並配合所附圖式,作詳細說明如下:The invention provides a microprocessor chip with anti-copy function, comprising a garbled generating unit, an encryption unit, a storage unit module and a control unit. The garbled singleton is produced and detailed with the following figures:

本發明在燒錄程式碼至記憶體的過程中,搭配隨機所產生的亂碼值,對原始程式碼進行加密,並將加密後的資料燒錄至記憶體中。由於亂碼值的不同,因此針對同一原始程式碼而言,仍可產生不同的加密結果。In the process of burning the code to the memory, the invention encrypts the original code with the garbled value generated by the random, and burns the encrypted data into the memory. Due to the garbled value, different encryption results can still be generated for the same original code.

就算有心人士竊取到微處理器晶片內的加密資料,也會因不同的微處理器晶片具有不同的加密資料,而無法得知原始程式碼。再者,由於亂碼值係隨機產生,並無規則性可言,故竊取者無法推得亂碼值,進而破解得知原始程式碼。因此,可大幅提高程式碼的安全性。Even if someone has stolen the encrypted data in the microprocessor chip, the different microprocessor chips have different encrypted data, and the original code cannot be known. Moreover, since the garbled values are randomly generated and there is no regularity, the thief cannot push the garbled value and crack the original code. Therefore, the security of the code can be greatly improved.

另外,本發明之微處理器晶片具有一鎖定功能。當有心人士試圖解除鎖定功能時,微處理器晶片便立即對記憶體內的程式碼進行抹除或是修改,讓有心人士無法讀取到正確的程式碼。Additionally, the microprocessor chip of the present invention has a locking function. When a person who is interested in trying to unlock the function, the microprocessor chip immediately erases or modifies the code in the memory, so that the person who is interested can not read the correct code.

在一可能實施例中,為了提高安全性,可將上述兩功能(亂碼加密功能及鎖定功能)整合於一微處理器晶片中,用以得到一具有防複製功能的微處理器晶片。然而,在其它實施例中,僅具有單一功能(如亂碼加密功能或鎖定功能)的微處理器晶片仍可達到防複製的功能。In a possible embodiment, in order to improve security, the above two functions (garbled encryption function and locking function) can be integrated into a microprocessor chip to obtain a microprocessor chip with anti-copy function. However, in other embodiments, a microprocessor chip having only a single function (such as garbled encryption or locking) can still achieve anti-copy functionality.

第一實施例:第1圖為本發明之微處理器晶片100之系統架構圖。在本實施例中,微處理器晶片100包括,一亂碼產生單元110、一加密單元120、一儲存模組150以及一控制單元140。如圖所示,儲存模組150包括一第一儲存單元130、一第二儲存單元132以及一第三儲存單元134,其中第一儲存單元130在本實施例為一引導程式燒錄記憶體(LDROM),第二儲存單元132在本實施例為一配置記憶體(Configure ROM),第三儲存單元134在本實施例為一使用者程式記憶體(APROM),其中第一儲存單元130、第二儲存單元132及第三儲存單元134皆連接至控制單元140,亂碼產生單元110也同時連接至加密單元120及第二儲存單元132,加密單元120連接至第一儲存單元130。控制單元140包括一中央處理器141以及一存取控制器142,其中存取控制器142具有解碼器之功能。First Embodiment: FIG. 1 is a system architecture diagram of a microprocessor chip 100 of the present invention. In this embodiment, the microprocessor chip 100 includes a garbled generating unit 110, an encryption unit 120, a storage module 150, and a control unit 140. As shown in the figure, the storage module 150 includes a first storage unit 130, a second storage unit 132, and a third storage unit 134. The first storage unit 130 is a boot program in this embodiment. LDROM), the second storage unit 132 is a configuration memory (Configure ROM) in this embodiment, and the third storage unit 134 is a user program memory (APROM) in the embodiment, wherein the first storage unit 130, The second storage unit 132 and the third storage unit 134 are both connected to the control unit 140. The garbled generating unit 110 is also connected to the encryption unit 120 and the second storage unit 132. The encryption unit 120 is connected to the first storage unit 130. The control unit 140 includes a central processing unit 141 and an access controller 142, wherein the access controller 142 has the function of a decoder.

在燒錄製程時,亂碼產生單元110以一隨機方式提供一亂碼值VAR 至加密單元120與第二儲存單元132之中,此時,加密單元120會將欲燒錄之一原始程式碼PCO 與亂碼值VAR 結合進行加密動作,進而產生一加密資料PCEN 至第一儲存單元130之中。本發明並不限定亂碼產生單元110的內部架構。在一可能實施例中,亂碼產生單元110係為一32位元計數器,由於計數器可在不同時間產生不同的計數值,因此每一次進行晶片燒錄時,每一晶片皆有不同的亂碼值VAR 。本發明並不限定加密單元120的加密方法。只要加密資料PCEN 不等於原始程式碼PCO 的加密方法均可應用於加密單元120中。When the recording process is burned, the garbled generating unit 110 provides a garbled value VA R to the encryption unit 120 and the second storage unit 132 in a random manner. At this time, the encryption unit 120 will burn one of the original code PCs. O combines with the garbled value VA R to perform an encryption operation, thereby generating an encrypted data PC EN into the first storage unit 130. The present invention does not limit the internal architecture of the garbled generating unit 110. In a possible embodiment, the garbled generating unit 110 is a 32-bit counter. Since the counter can generate different count values at different times, each wafer has a different garbled value VA each time the wafer is burned. R. The present invention does not limit the encryption method of the encryption unit 120. The encryption method as long as the encrypted material PC EN is not equal to the original code PC O can be applied to the encryption unit 120.

第2圖為本發明之晶片讀取資料之流程圖,此流程圖揭露經由本發明防止盜拷方法所燒錄之晶片是如何讀取資料及如何進行防拷。請同時參閱第1圖,當控制單元140要讀取加密資料PCEN 時,中央處理器141發出一存取命令SCOM至存取控制器142。存取控制器142根據存取命令SCOM ,存取第一儲存單元130所儲存的加密資料PCEN 及第二儲存單元132所儲存的亂碼值VAR (步驟S210),經由存取控制器142比對第二儲存單元132所儲存的亂碼值VAR 與加密資料PCEN 之中的亂碼值VAR 是否相同(步驟S220),若比對結果是相同時,將解密後的結果(即原始程式碼PCO )提供予中央處理器141(步驟S230)。中央處理器141再執行原始程式碼PCO 及執行儲在第三儲存單元134內的一使用者程式(application software)。若比對結果不相同時,代表微處理器晶片100有被破解的疑慮,此時中央處理器141則會對第三儲存單元134所儲存的一部分或全部資料進行抺除破壞性動作(步驟S240),用以避免有心人士竊取相關程式碼及相關設定。並且每一片晶片具有不同的亂碼值VAR ,因此就算盜拷者破解單一晶片之亂碼值VAR (此時第三儲存單元134所儲存的一部分或全部資料已經進行抺除破壞),也無法藉由己得知之亂碼值VAR 對其它晶片的進行破解,因此可藉由本發明所提供之燒錄方法,在晶片燒錄時替客戶(晶片設計商)做出嚴密的防盜設計。2 is a flow chart of the wafer reading data of the present invention. The flow chart discloses how the wafers burned by the method of preventing theft by the method of the present invention read data and how to perform copy protection. Referring to FIG. 1 at the same time, when the control unit 140 is to read the encrypted data PC EN , the central processing unit 141 issues an access command SCOM to the access controller 142. The access controller 142 accesses the encrypted data PC EN stored by the first storage unit 130 and the garbled value VA R stored by the second storage unit 132 according to the access command S COM (step S210), via the access controller 142. comparing the second storage unit 132 is stored in the distortion value among the distortion of the encrypted data VA R PC EN VA R values are the same (step S220), if the comparison result is the same, the decrypted result (i.e., the original program The code PC O ) is supplied to the central processing unit 141 (step S230). The central processing unit 141 then executes the original code PC O and executes an application software stored in the third storage unit 134. If the comparison result is different, the microprocessor chip 100 is suspected of being cracked. At this time, the central processing unit 141 performs a destructive action on some or all of the data stored in the third storage unit 134 (step S240). ), in order to avoid the intention of people to steal the relevant code and related settings. And each chip has a different garbled value VA R , so even if the pirate cracks the garbled value VA R of the single chip (in this case, some or all of the data stored in the third storage unit 134 has been destroyed), it cannot be borrowed. The garbled value VA R is known to be cracked on other chips, so that the rigorous anti-theft design can be made for the customer (wafer designer) at the time of wafer burning by the burning method provided by the present invention.

第二實施例:請參閱第3圖所示,另外為了提高晶片在燒錄時的加密程度,晶片製造商要求客戶提供一金鑰值VAK 。金鑰值VAK 可儲存在第三儲存單元334中或其它儲存單元之中,當微處理器晶片300進行燒錄時,此加密單元320會將欲燒錄之一原始程式碼PCO 與亂碼值VAR 及金鑰值VAK 結合進行加密動作,進而產生加密等級更為複雜一加密資料PCEN 至第一儲存單元330之中。Second Embodiment: Please refer to FIG. 3, in addition, in order to improve the degree of encryption of the wafer during programming, the wafer manufacturer requires the customer to provide a key value VA K . The key value VA K may be stored in the third storage unit 334 or other storage unit. When the microprocessor chip 300 is burned, the encryption unit 320 will burn one of the original code PC O and garbled characters. The value VA R and the key value VA K are combined to perform an encryption operation, thereby generating a more complex encryption level PC EN into the first storage unit 330.

當控制單元340要讀取此加密資料PCEN 時,中央處理器341發出一存取命令SCOM 至存取控制器342。存取控制器342根據存取命令SCOM ,存取第一儲存單元330所儲存的加密資料PCEN 、第二儲存單元332所儲存的亂碼值VAR 及第三儲存單元334所儲存的金鑰值VAK ,經由存取控制器342比對第二儲存單元332所儲存的亂碼值VAR 及金鑰值VAK 與加密資料PCEN 之中的亂碼值VAR 及金鑰值VAK 是否相同,若比對結果是相同時,將解密後的結果(即原始程式碼PCO )提供予中央處理器341。中央處理器341再執行原始程式碼PCO 及執行儲在第三儲存單元334內的一使用者程式。若比對結果不相同時,代表微處理器晶片300有被破解的疑慮,此時中央處理器341則會對第三儲存單元334所儲存的一部分或全部資料進行抹除破壞性動作,用以避免有心人士竊取相關程式碼及相關設定。如此除了提高競爭者破解的難度,晶片製造商更是以客製化的方式服務客戶。When the control unit 340 is to read the encrypted material PC EN , the central processing unit 341 issues an access command S COM to the access controller 342. The access controller 342 accesses the encrypted data PC EN stored by the first storage unit 330, the garbled value VA R stored by the second storage unit 332, and the key stored by the third storage unit 334 according to the access command S COM . value VA K, via an access controller 342 for the same hash value ratio is VA R key value and the distortion value among VA K VA R VA K and key value data with the PC EN encryption unit 332 stored in the second storage If the result of the comparison is the same, the decrypted result (ie, the original code PC O ) is supplied to the central processing unit 341. The central processing unit 341 then executes the original code PC O and executes a user program stored in the third storage unit 334. If the comparison result is different, the microprocessor chip 300 is suspected of being cracked. At this time, the central processing unit 341 erases some or all of the data stored in the third storage unit 334 to destroy the destructive action. Avoid people who are interested in stealing relevant code and related settings. In this way, in addition to improving the difficulty of competitors to crack, chip manufacturers are more customer-oriented ways to serve customers.

第三實施例:請參閱第4圖所示,當微處理器晶片400進行燒錄時,預先在第二儲存單元432儲存一特定比對參數PCES ,除了原有第一實施例及第二實施例的比對方式外,當此微處理器晶片400安裝在一電子裝置600時,當此電子裝置600運作時,此微處理器晶片400會接收至少一外界電路元件500輸入至微處理器晶片400之一外界資料PCEd ,控制單元440比對外界資料PCEd 內的參數與第二儲存單元432儲存的特定比對參數PCES 是否相同,若比對結果是相同時,將解密後的結果(即原始程式碼PCO )提供予中央處理器441。中央處理器441再執行原始程式碼PCO 及執行儲在第三儲存單元434內的一使用者程式。若比對結果不相同時,代表微處理器晶片400有被拔除並安裝至其它電子裝置之中的疑慮,同時也代表此微處理器晶片400有破解的疑慮,此時中央處理器441則會對第三儲存單元434所儲存的一部分或全部資料進行抹除破壞性動作。Third Embodiment: Referring to FIG. 4, when the microprocessor chip 400 is programmed, a specific comparison parameter PC ES is stored in the second storage unit 432 in advance, except for the first embodiment and the second embodiment. In addition to the comparison mode of the embodiment, when the microprocessor chip 400 is mounted on an electronic device 600, the microprocessor chip 400 receives at least one external circuit component 500 input to the microprocessor when the electronic device 600 operates. The external data PC Ed of the wafer 400, the control unit 440 compares whether the parameter in the external data PC Ed is the same as the specific comparison parameter PC ES stored in the second storage unit 432. If the comparison result is the same, the decrypted The result (i.e., the original code PC O ) is supplied to the central processing unit 441. The central processing unit 441 executes the original code PC O and executes a user program stored in the third storage unit 434. If the comparison results are different, it represents that the microprocessor chip 400 has been removed and installed into other electronic devices. At the same time, it also represents that the microprocessor chip 400 has a cracking concern, and the central processor 441 will The destructive action is erased on some or all of the data stored in the third storage unit 434.

另外,在不同時間下的燒錄製程中,微處理晶片400內的亂碼產生單元所產生的亂碼值VAR 並不相同。舉例而言,假設欲對兩微處理晶片進行燒錄製程。在燒錄第一微處理晶片時,第一微處理晶片內的亂碼產生單元產生一第一亂碼值,而在燒錄第二微處理晶片時,第二微處理晶片內的亂碼產生單元產生一第二亂碼值。在本實施例中,第一亂碼值不同於第二亂碼值。In addition, the garbled values VA R generated by the garbled generating unit in the microchip 400 are not the same during the burning recording process at different times. For example, suppose that two micro-processed wafers are to be burned. When the first micro-processed wafer is burned, the garbled generating unit in the first micro-processed wafer generates a first garbled value, and when the second micro-processed wafer is burned, the garbled generating unit in the second micro-processed wafer generates a The second garbled value. In this embodiment, the first garbled value is different from the second garbled value.

由於第一及第二微處理晶片具有不同的亂碼值,因此,針對同一原始程式碼而言,可產生兩不同的加密資料。此兩不同的加密資料可儲存於相對應的儲存單元中,並可由相對應的控制單元所存取。因此,就算有心人士破解了第一微處理晶片,也無法利用相同的亂碼值,竊取第二微處理晶片內的程式碼,因而提高了競爭者破解的難度。Since the first and second microprocessor chips have different garbled values, two different cryptographic data can be generated for the same original code. The two different encrypted data can be stored in the corresponding storage unit and can be accessed by the corresponding control unit. Therefore, even if the person who has the heart has cracked the first micro-processed chip, the same garbled value cannot be used to steal the code in the second micro-processed chip, thereby improving the difficulty of the competitor's cracking.

再者,本發明並不限定第一及第二微處理晶片的內部架構。在一可能實施例中,第一及第二微處理晶片內的各單元具有相同或不同的電路架構。舉例而言,第一微處理晶片內的亂碼產生單元的電路架構可相同或不同於第二微處理晶片內的亂碼產生單元的電路架構。同樣地,第一微處理晶片內的加密單元、儲存模組及控制單元的電路架構亦可相同或不同於第二微處理晶片內的加密單元、儲存模組及控制單元的電路架構。Furthermore, the invention does not limit the internal architecture of the first and second microprocessor wafers. In a possible embodiment, the cells within the first and second microprocessor wafers have the same or different circuit architecture. For example, the circuit architecture of the garbled generating unit within the first microprocessor chip may be the same or different than the circuit architecture of the garbled generating unit within the second microprocessor chip. Similarly, the circuit architecture of the encryption unit, the storage module, and the control unit in the first microprocessor chip may be the same or different from the circuit architecture of the encryption unit, the storage module, and the control unit in the second microprocessor chip.

除非另作定義,在此所有詞彙(包含技術與科學詞彙)均屬本發明所屬技術領域中具有通常知識者之一般理解。此外,除非明白表示,詞彙於一般字典中之定義應解釋為與其相關技術領域之文章中意義一致,而不應解釋為理想狀態或過分正式之語態。Unless otherwise defined, all terms (including technical and scientific terms) are used in the ordinary meaning Moreover, unless expressly stated, the definition of a vocabulary in a general dictionary should be interpreted as consistent with the meaning of an article in its related art, and should not be interpreted as an ideal state or an overly formal voice.

雖然本發明已以較佳實施例揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作些許之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Although the present invention has been disclosed in the above preferred embodiments, it is not intended to limit the invention, and any one of ordinary skill in the art can make some modifications and refinements without departing from the spirit and scope of the invention. Therefore, the scope of the invention is defined by the scope of the appended claims.

100、300、400...微處理器晶片100, 300, 400. . . Microprocessor chip

110、310、410...亂碼產生單元110, 310, 410. . . Garble generating unit

120、320、420...加密單元120, 320, 420. . . Encryption unit

150、350、450...儲存模組150, 350, 450. . . Storage module

130、132、134、330、332、334、430、432、434...儲存單元130, 132, 134, 330, 332, 334, 430, 432, 434. . . Storage unit

140、340、440...控制單元140, 340, 440. . . control unit

141、341、441...中央處理器141, 341, 441. . . CPU

142、342、442...存取控制器142, 342, 442. . . Access controller

500...外界電路元件500. . . External circuit component

600...電子裝置600. . . Electronic device

S210~S240...步驟S210~S240. . . step

VAR ...亂碼值VA R . . . Garbled value

PCO ...原始程式碼PC O . . . Original code

PCEN ...加密資料PC EN . . . Encrypted data

VAK ...金鑰值VA K . . . Key value

SCOM ...存取命令S COM . . . Access command

PCES ...比對參數PC ES . . . Comparison parameter

PCEd ...外界資料PC Ed . . . External data

第1圖為本發明之微處理器晶片之一可能系統架構圖。Figure 1 is a diagram showing one possible system architecture of a microprocessor chip of the present invention.

第2圖為本發明之晶片讀取資料之流程圖。Figure 2 is a flow chart of the wafer reading data of the present invention.

第3及4圖為本發明之微處理器晶片之其它可能系統架構圖。Figures 3 and 4 are diagrams of other possible system architectures for the microprocessor chip of the present invention.

100...微處理器晶片100. . . Microprocessor chip

110...亂碼產生單元110. . . Garble generating unit

120...加密單元120. . . Encryption unit

130...第一儲存單元130. . . First storage unit

132...第二儲存單元132. . . Second storage unit

134...第三儲存單元134. . . Third storage unit

140...控制單元140. . . control unit

141...中央處理器141. . . CPU

142...存取控制器142. . . Access controller

150...儲存模組150. . . Storage module

VAR ...亂碼值VA R . . . Garbled value

PCO ...原始程式碼PC O . . . Original code

PCEN ...加密資料PC EN . . . Encrypted data

SCOM ...存取命令S COM . . . Access command

Claims (21)

一種具有防複製功能的微處理器晶片,包括:一亂碼產生單元,用以提供一第一亂碼值;一加密單元,將該第一亂碼值與一原始程式碼進行加密,用以產生一加密資料;一儲存模組,儲存該第一亂碼值及該加密資料;以及一控制單元,存取該儲存模組,用以擷取並解密該加密資料,並根據解密後的結果而動作。 A microprocessor chip with anti-copy function includes: a garbled generating unit for providing a first garbled value; an cryptographic unit for encrypting the first garbled value with an original code for generating an encryption Data storage module storing the first garbled value and the encrypted data; and a control unit accessing the storage module for capturing and decrypting the encrypted data and operating according to the decrypted result. 如申請專利範圍第1項所述之具有防複製功能的微處理器晶片,其中該亂碼產生單元係為一計數器。 The microprocessor chip with anti-copy function according to claim 1, wherein the garble generating unit is a counter. 如申請專利範圍第1項所述之具有防複製功能的微處理器晶片,其中該儲存模組包括:一第一儲存單元,用以儲存該加密資料;一第二儲存單元,用以儲存該第一亂碼值;以及一第三儲存單元,用以儲存一使用者程式。 The microprocessor chip of the anti-copying function of claim 1, wherein the storage module comprises: a first storage unit for storing the encrypted data; and a second storage unit for storing the a first garbled value; and a third storage unit for storing a user program. 如申請專利範圍第3項所述之具有防複製功能的微處理器晶片,其中該第一儲存單元儲存一引導程式,該第三儲存單元儲存一使用者程式。 The microprocessor chip with anti-copy function as described in claim 3, wherein the first storage unit stores a boot program, and the third storage unit stores a user program. 如申請專利範圍第3項所述之具有防複製功能的微處理器晶片,其中該控制單元包括:一中央處理器,發出一存取命令;以及一存取控制器,根據該存取命令,存取該儲存模組所儲存的資料,用以比對該第一儲存單元所儲存的該加密資料之中的亂碼值是否相同於該第二儲存單元所儲存的該第一亂碼值。 The microprocessor chip having anti-copy function according to claim 3, wherein the control unit comprises: a central processing unit that issues an access command; and an access controller, according to the access command, Accessing the data stored in the storage module to compare whether the garbled value in the encrypted data stored in the first storage unit is equal to the first garbled value stored in the second storage unit. 如申請專利範圍第5項所述之具有防複製功能的微處理器晶片,其中當該第一儲存單元所儲存的該加密資料之中的亂碼值相同於該第二儲存單元所儲存的該第一亂碼值時,該存取控制器擷取並解密該第一儲存單元所儲存的該加密資料,並將解密後的結果提供予該中央處理器,該中央處理器執行解密後的結果以及該使用者程式;其中當該第一儲存單元所儲存的該加密資料之中的亂碼值不同於該第二儲存單元所儲存的該第一亂碼值時,該中央處理器對該第三儲存單元所儲存的該使用者程式進行抹除破壞。 The microprocessor chip with anti-copy function according to claim 5, wherein the garbled value in the encrypted data stored by the first storage unit is the same as the first stored in the second storage unit a garbled value, the access controller captures and decrypts the encrypted data stored by the first storage unit, and provides the decrypted result to the central processor, the central processor performs the decrypted result and the a user program; wherein, when the garbled value in the encrypted data stored by the first storage unit is different from the first garbled value stored in the second storage unit, the central processing unit is configured by the third storage unit The stored user program is erased and destroyed. 如申請專利範圍第3項所述之具有防複製功能的微處理器晶片,其中該第三儲存單元更儲存一金鑰值。 The microprocessor chip with anti-copy function as described in claim 3, wherein the third storage unit further stores a key value. 如申請專利範圍第7項所述之具有防複製功能的微處理器晶片,其中該加密單元更將該金鑰值與該第一亂碼值和該原始程式碼進行加密,用以產生該加密資料。 The microprocessor chip with anti-copy function according to claim 7, wherein the encryption unit further encrypts the key value with the first garbled value and the original code to generate the encrypted data. . 如申請專利範圍第8項所述之具有防複製功能的微處理器晶片,其中該控制單元包括:一中央處理器,發出一存取命令;以及一存取控制器,根據該存取命令,存取該儲存模組所儲存的資料,用以比對該第一儲存單元所儲存的該加密資料之中的亂碼值及金鑰值是否相同於該第二儲存單元所儲存的該第一亂碼值及該第三儲存單元所儲存的該金鑰值。 The microprocessor chip having anti-copy function according to claim 8, wherein the control unit comprises: a central processing unit that issues an access command; and an access controller, according to the access command, Accessing the data stored in the storage module to compare whether the garbled value and the key value in the encrypted data stored in the first storage unit are the same as the first garbled code stored in the second storage unit The value and the key value stored by the third storage unit. 一種晶片燒錄系統,包括:一第一晶片,包括:一第一亂碼產生單元,用以在燒錄製程時提供一第一亂碼值;一第一加密單元,在燒錄製程時將該第一亂碼值與一第一原始程 式碼進行加密,用以產生一第一加密資料;一第一儲存模組,儲存該第一亂碼值及該第一加密資料;以及一第一控制單元,存取該第一儲存模組,用以擷取並解密該第一加密資料,並根據解密後的結果而動作。 A chip burning system, comprising: a first chip, comprising: a first garbled generating unit, configured to provide a first garbled value during a burning recording process; and a first cryptographic unit, the first cryptographic unit a garbled value and a first original path The code is encrypted to generate a first encrypted data; a first storage module stores the first garbled value and the first encrypted data; and a first control unit accesses the first storage module, The method for capturing and decrypting the first encrypted data, and operating according to the decrypted result. 如申請專利範圍第10項所述之晶片燒錄系統,其中該第一亂碼產生單元係為一計數器。 The wafer burning system of claim 10, wherein the first garbled generating unit is a counter. 如申請專利範圍第10項所述之晶片燒錄系統,其中該第一儲存模組包括:一第一儲存單元,用以儲存該第一加密資料;一第二儲存單元,用以儲存該第一亂碼值;以及一第三儲存單元,用以儲存一使用者程式。 The chip storage system of claim 10, wherein the first storage module comprises: a first storage unit for storing the first encrypted data; and a second storage unit for storing the first a garbled value; and a third storage unit for storing a user program. 如申請專利範圍第12項所述之晶片燒錄系統,其中該第一儲存單元儲存一引導程式,該第三儲存單元儲存一使用者程式。 The wafer burning system of claim 12, wherein the first storage unit stores a boot program, and the third storage unit stores a user program. 如申請專利範圍第12項所述之晶片燒錄系統,其中該第一控制單元包括:一中央處理器,發出一存取命令;以及一存取控制器,根據該存取命令,存取該第一儲存模組所儲存的資料,用以比對該第一儲存單元所儲存的該第一加密資料之中的第一亂碼值是否相同於該第二儲存單元所儲存的該第一亂碼值。 The wafer burning system of claim 12, wherein the first control unit comprises: a central processing unit that issues an access command; and an access controller that accesses the access command according to the access control command The data stored by the first storage module is used to compare whether the first garbled value in the first encrypted data stored in the first storage unit is the same as the first garbled value stored in the second storage unit. . 如申請專利範圍第14項所述之晶片燒錄系統,其中當該第一儲存單元所儲存的該第一加密資料之中的亂碼值相同於該第二儲存單元所儲存的該第一亂碼值時,該存取控制器擷取並解密該第一儲存單元所儲存的該第一加密資料,並將解密後的結果提供予該中央處理器,該中央處理器執行解密後的結果以及該使用者程式; 其中當該第一儲存單元所儲存的該第一加密資料之中的亂碼值不同於該第二儲存單元所儲存的該第一亂碼值時,該中央處理器對該第三儲存單元所儲存的該使用者程式進行抹除破壞。 The chip burning system of claim 14, wherein the garbled value in the first encrypted data stored by the first storage unit is the same as the first garbled value stored in the second storage unit. The access controller captures and decrypts the first encrypted data stored by the first storage unit, and provides the decrypted result to the central processor, and the central processor performs the decrypted result and the use. Program The central processor stores the garbled value in the first encrypted data stored by the first storage unit different from the first garbled value stored in the second storage unit. The user program erases the damage. 如申請專利範圍第12項所述之晶片燒錄系統,其中該第三儲存單元更儲存一金鑰值。 The wafer burning system of claim 12, wherein the third storage unit further stores a key value. 如申請專利範圍第16項所述之晶片燒錄系統,其中該加密單元更將該金鑰值與該第一亂碼值和該第一原始程式碼進行加密,用以產生該第一加密資料。 The chip burning system of claim 16, wherein the encryption unit further encrypts the key value with the first garbled value and the first original code to generate the first encrypted data. 如申請專利範圍第17項所述之晶片燒錄系統,其中該第一控制單元包括:一中央處理器,發出一存取命令;以及一存取控制器,根據該存取命令,存取該第一儲存模組所儲存的資料,用以比對該第一儲存單元所儲存的該第一加密資料之中的亂碼值及金鑰值是否相同於該第二儲存單元所儲存的該第一亂碼值及該第三儲存單元所儲存的該金鑰值。 The wafer burning system of claim 17, wherein the first control unit comprises: a central processing unit that issues an access command; and an access controller that accesses the access command according to the access control command The data stored in the first storage module is used to compare whether the garbled value and the key value in the first encrypted data stored in the first storage unit are the same as the first stored in the second storage unit. The garbled value and the key value stored by the third storage unit. 如申請專利範圍第10項所述之晶片燒錄系統,更包括一第二晶片,該第二晶片包括:一第二亂碼產生單元,用以在燒錄製程時提供一第二亂碼值,其中該第二亂碼值不同於該第一亂碼值;一第二加密單元,在燒錄製程時將該第二亂碼值與一第二原始程式碼進行加密,用以產生一第二加密資料;一第二儲存模組,儲存該第二亂碼值及該第二加密資料;以及一第二控制單元,存取該第二儲存模組,用以擷取並解密該第二加密資料,並根據解密後的結果而動作。 The chip burning system of claim 10, further comprising a second chip, the second chip comprising: a second garbled generating unit for providing a second garbled value during the burning process, wherein The second garbled value is different from the first garbled value; a second cryptographic unit encrypts the second garbled value and a second original code during the burning process to generate a second encrypted data; a second storage module storing the second garbled value and the second encrypted data; and a second control unit accessing the second storage module for capturing and decrypting the second encrypted data, and decrypting according to the second The result is after the result. 如申請專利範圍第19項所述之晶片燒錄系統,其中該第一及第二亂碼產生單元具有相同電路結構,該第一及第二加密單元具有相同電路結構,該第一及第二儲存模組具有相同電路結構,該第一及第二控制單元具有相同電路結構。 The wafer burning system of claim 19, wherein the first and second garbled generating units have the same circuit structure, the first and second cryptographic units have the same circuit structure, and the first and second storages The modules have the same circuit structure, and the first and second control units have the same circuit structure. 一種電子裝置,包括:至少一外界電路元件,提供一外界資料;以及一微處理器晶片,包括:一亂碼產生單元,用以提供一亂碼值;一加密單元,將該亂碼值與一原始程式碼進行加密,用以產生一加密資料;一儲存模組,包括:一第一儲存單元,儲存該加密資料;一第二儲存單元,儲存該亂碼值及一特定比對資料;一第三儲存單元,儲存一使用者程式;以及一控制單元,比對該外界資料內的參數以及該第二儲存單元所儲存的該特定比對參數是否相同,若該外界資料內的參數相同於該第二儲存單元所儲存的該特定比對參數,則解密該加密資料,並執行解密後的結果以及該使用者程式,若該外界資料內的參數不同於該第二儲存單元所儲存的該特定比對參數時,則該控制單元便抹除破壞該第三儲存單元所儲存的該使用者程式。An electronic device comprising: at least one external circuit component providing an external data; and a microprocessor chip comprising: a garbled generating unit for providing a garbled value; an cryptographic unit, the garbled value and an original program The code is encrypted to generate an encrypted data; a storage module includes: a first storage unit for storing the encrypted data; a second storage unit for storing the garbled value and a specific comparison data; and a third storage a unit storing a user program; and a control unit comparing whether the parameter in the external data and the specific comparison parameter stored in the second storage unit are the same, if the parameter in the external data is the same as the second And the specific comparison parameter stored by the storage unit decrypts the encrypted data, and performs the decrypted result and the user program, if the parameter in the external data is different from the specific comparison stored in the second storage unit When the parameter is used, the control unit erases the user program stored in the third storage unit.
TW101104635A 2012-02-14 2012-02-14 Micro-processor with an anti-copy function, chip programming system thereof and electronic device TWI480735B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW101104635A TWI480735B (en) 2012-02-14 2012-02-14 Micro-processor with an anti-copy function, chip programming system thereof and electronic device
CN201210128403.5A CN103246832B (en) 2012-02-14 2012-04-27 Microprocessor chip with anti-copy function and recording system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW101104635A TWI480735B (en) 2012-02-14 2012-02-14 Micro-processor with an anti-copy function, chip programming system thereof and electronic device

Publications (2)

Publication Number Publication Date
TW201333702A TW201333702A (en) 2013-08-16
TWI480735B true TWI480735B (en) 2015-04-11

Family

ID=48926347

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101104635A TWI480735B (en) 2012-02-14 2012-02-14 Micro-processor with an anti-copy function, chip programming system thereof and electronic device

Country Status (2)

Country Link
CN (1) CN103246832B (en)
TW (1) TWI480735B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424165B (en) * 2013-09-06 2018-05-25 北大方正集团有限公司 A kind of text document mess code detection method and system
TWI502400B (en) * 2014-07-30 2015-10-01 Elan Microelectronics Corp Microcontroller unit and protecting method for a data in the microcontroller unit
CN104579646B (en) * 2015-01-30 2015-12-30 南京法威克信息科技有限公司 Method, device and circuit that the limited monotonic transformation of clobber book and encryption and decryption thereof are applied
CN106156550A (en) * 2016-07-04 2016-11-23 广州市鸿远电子科技有限公司 A kind of chip prevents the method cracked
TWI662474B (en) * 2018-03-06 2019-06-11 智原科技股份有限公司 Method and apparatus for performing firmware programming on microcontroller chip, and associated microcontroller chip
CN110837664B (en) * 2018-08-15 2023-07-21 旺宏电子股份有限公司 Multi-chip packaging module, control method thereof and safety chip
TWI767709B (en) * 2021-05-18 2022-06-11 中華電信股份有限公司 System and method of data authorization and computer readable medium therefor

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010032312A1 (en) * 2000-03-06 2001-10-18 Davor Runje System and method for secure electronic digital rights management, secure transaction management and content distribution
TW200511117A (en) * 2003-09-10 2005-03-16 Wistron Corp Method for controlling a computer system
TW200629068A (en) * 2004-09-10 2006-08-16 Ibm An integrated circuit chip for encryption and decryption having a secure mechanism for programming ON-chip hardware
CN1689269B (en) * 2002-09-26 2010-04-28 国际商业机器公司 System and method for guaranteeing software integrity

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5825878A (en) * 1996-09-20 1998-10-20 Vlsi Technology, Inc. Secure memory management unit for microprocessor
CN100373376C (en) * 2005-01-21 2008-03-05 深圳市致芯微电子有限公司 Encryption chip, CPU program encryption method using said chip and system thereof
CN101149768B (en) * 2006-09-20 2011-04-27 展讯通信(上海)有限公司 Special processor software encryption and decryption method
CN101639887A (en) * 2009-08-19 2010-02-03 浪潮电子信息产业股份有限公司 Program encryption method of embedded system
CN201556209U (en) * 2009-08-25 2010-08-18 中国华录集团有限公司 Encryption device of embedded software program based on safety MCU

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010032312A1 (en) * 2000-03-06 2001-10-18 Davor Runje System and method for secure electronic digital rights management, secure transaction management and content distribution
CN1689269B (en) * 2002-09-26 2010-04-28 国际商业机器公司 System and method for guaranteeing software integrity
TW200511117A (en) * 2003-09-10 2005-03-16 Wistron Corp Method for controlling a computer system
TW200629068A (en) * 2004-09-10 2006-08-16 Ibm An integrated circuit chip for encryption and decryption having a secure mechanism for programming ON-chip hardware

Also Published As

Publication number Publication date
TW201333702A (en) 2013-08-16
CN103246832B (en) 2016-01-06
CN103246832A (en) 2013-08-14

Similar Documents

Publication Publication Date Title
TWI480735B (en) Micro-processor with an anti-copy function, chip programming system thereof and electronic device
JP5636371B2 (en) Method and system for code execution control in a general purpose computing device and code execution control in a recursive security protocol
US8006095B2 (en) Configurable signature for authenticating data or program code
US8438658B2 (en) Providing sealed storage in a data processing device
US7237121B2 (en) Secure bootloader for securing digital devices
KR100625365B1 (en) System and method for authentication
US6370649B1 (en) Computer access via a single-use password
JP5703391B2 (en) System and method for tamper resistant boot processing
US10819514B2 (en) Electronic component of electronic device, method of starting electronic device and encryption method
JP3689431B2 (en) Method and apparatus for secure processing of encryption keys
US8418259B2 (en) TPM-based license activation and validation
US7461268B2 (en) E-fuses for storing security version data
TWI402682B (en) Memory protection for embedded controllers
TWI514187B (en) Systems and methods for providing anti-malware protection on storage devices
US10318765B2 (en) Protecting critical data structures in an embedded hypervisor system
EP1273996A2 (en) Secure bootloader for securing digital devices
US20130254906A1 (en) Hardware and Software Association and Authentication
US20070297606A1 (en) Multiple key security and method for electronic devices
US20070237325A1 (en) Method and apparatus to improve security of cryptographic systems
KR20150011802A (en) Method and system for process working set isolation
US11409872B2 (en) Confirming a version of firmware loaded to a processor-based device
TWI712889B (en) Memory device and program
US9177121B2 (en) Code protection using online authentication and encrypted code execution
TW201411405A (en) Protecting secure software in a multi-security-CPU system
TWI423064B (en) A method and apparatus for coupling a computer memory and a motherboard