WO2023098671A1 - 芯片授权和验证方法、装置和电子设备 - Google Patents

芯片授权和验证方法、装置和电子设备 Download PDF

Info

Publication number
WO2023098671A1
WO2023098671A1 PCT/CN2022/135082 CN2022135082W WO2023098671A1 WO 2023098671 A1 WO2023098671 A1 WO 2023098671A1 CN 2022135082 W CN2022135082 W CN 2022135082W WO 2023098671 A1 WO2023098671 A1 WO 2023098671A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
chip
authorization
identity authentication
verification
Prior art date
Application number
PCT/CN2022/135082
Other languages
English (en)
French (fr)
Inventor
谢竑
顾国梁
董宇
Original Assignee
展讯通信(上海)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 展讯通信(上海)有限公司 filed Critical 展讯通信(上海)有限公司
Publication of WO2023098671A1 publication Critical patent/WO2023098671A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/32Circuit design at the digital level
    • G06F30/33Design verification, e.g. functional simulation or model checking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the embodiments of the present application relate to the field of chip design, and in particular to a chip authorization and verification method, device and electronic equipment.
  • chip manufacturers will make differentiated designs on the same chip, and because these designs invest in different resources, different authorizations are required to restrict the scope of use and give different prices.
  • the embodiment of the present application provides a chip authorization and verification method, device, and electronic equipment.
  • the authentication server encrypts the authorization request information and the authorization list information to form authorization ciphertext information and deploys it to the chip, and then encrypts the authorization ciphertext information of the chip. Decrypt to obtain the authorized plaintext information and verify whether the authorized plaintext information has been tampered with.
  • Authorized deployment under the secure channel can query whether the user is using the chip according to the intention authorized by the chip manufacturer, and the authorized deployment at the production end can reduce the extra process of the chip production end.
  • the embodiment of the present application provides a chip authorization method, including:
  • the first authorization request information including the chip identification information, project information and customer identity authentication information of the first chip
  • generating the authorization ciphertext information of the first chip according to the chip identification information, the project information, and the customer identity authentication information includes:
  • the authorization list information includes the first chip acquired functions
  • the authorization list information is encrypted at least once to obtain the authorization ciphertext information.
  • determining the authorization list information of the first chip according to a combination of one or more of the chip identification information, the project information, and the customer identity authentication information includes:
  • chip authorization balance If the chip authorization balance is not zero, determine the authorization list information of the first chip according to the chip identification information, and decrease the chip authorization balance by one.
  • determining the authorization list information of the first chip according to a combination of one or more of the chip identification information, the project information, and the customer identity authentication information includes:
  • chip authorization balance If the chip authorization balance is not zero, determine the authorization list information of the first chip according to the chip identification information and the item information, and decrease the chip authorization balance by one.
  • the authorization list information is encrypted at least once to obtain the authorization ciphertext information, including:
  • the embodiment of the present application provides a chip verification method, including:
  • verifying the chip identification information, the project information, the customer identity authentication information, and the authorization list information according to the first verification information includes:
  • the second verification information is consistent with the first verification information, it is confirmed that the chip identification information, the item information, the customer identity authentication information and the authorization list information have not been tampered with.
  • the method further include:
  • the authentication server According to the arrangement format of the chip identification information, the item information, the customer identity authentication information, the authorization list information and the first verification information, or, according to the authentication identifier in the authorization plaintext information, Verifying whether the authorization plaintext information is authorized by the authentication server;
  • the authorization request information and the authorization list information are first encrypted by the authentication server to form the authorization ciphertext information and deployed to the chip, and then the authorization ciphertext information of the chip is decrypted to obtain the authorization plaintext information and verify whether the authorization plaintext information is tampered with.
  • Authorized deployment under the secure channel can query whether the user is using the chip according to the intention authorized by the chip manufacturer, and the authorized deployment at the production end can reduce the extra process of the chip production end.
  • the embodiment of the present application provides a chip authorization device, including:
  • a receiving module configured to receive first authorization request information sent by the chip authorization tool, where the first authorization request information includes chip identification information, project information, and customer identity authentication information of the first chip;
  • a generation module configured to generate authorization ciphertext information of the first chip according to the chip identification information, the project information and the customer identity authentication information;
  • a sending module configured to send the authorized ciphertext information to the chip authorization tool, so that the chip authorization tool deploys the authorized ciphertext information to the first chip.
  • the embodiment of the present application provides a chip verification device, including:
  • the reading module is used to read the authorization ciphertext information of the first chip from the security area of the first chip after the first chip restarts;
  • a decryption module configured to decrypt the authorized ciphertext information through a decryption key to obtain authorized plaintext information
  • a confirmation module configured to determine chip identification information, project information, customer identity authentication information, authorization list information, and first verification information from the authorized plaintext information
  • a verification module configured to verify the chip identification information, the item information, the customer identity authentication information and the authorization list information according to the first verification information
  • the driving module is used to start the first chip if the verification is passed, otherwise the first chip fails to start and enters the flashing process.
  • the embodiment of the present application provides an electronic device, including:
  • At least one memory communicatively coupled to the processor, wherein:
  • the memory stores program instructions executable by the processor, and the processor calls the program instructions to execute the method of the first aspect or the second aspect.
  • an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the method of the first aspect or the second aspect.
  • FIG. 1 is a schematic structural diagram of a chip authorization device provided by an embodiment of the present application
  • FIG. 2 is a flow chart of a chip authorization method provided by an embodiment of the present application
  • FIG. 3 is a flow chart of a chip verification method provided in an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a chip authorization device provided by an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a chip verification device provided in an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 1 is a schematic structural diagram of a chip authorization device provided by an embodiment of the present application. As shown in FIG. 1 , it may include: an authentication server 110 , a chip authorization tool 120 , a terminal device 130 , a first chip 140 and a security partition 150 .
  • the authentication server 110 needs to authorize the operation of the first chip 140 .
  • the chip authorization tool 120 sends the first authorization request information of the first chip 140 to the authentication server 110. After receiving the first authorization request information, the authentication server 110 encrypts it to form authorization ciphertext information. After that, the authentication server 110 sends the authorization ciphertext The information is sent to the chip authorization tool 120 , and the chip authorization tool 120 stores the authorization ciphertext information in the secure partition 150 .
  • the chip authorization tool can establish a secure channel with the authentication server, and the encrypted authorization ciphertext information is finally stored in the security partition, which can ensure that the chip manufacturer can query the usage information of the first chip ; and the chip authorization and deployment work is carried out during the production of terminal equipment, which reduces the extra process at the chip production end.
  • FIG. 2 is a flow chart of a chip authorization method provided by an embodiment of the present application. As shown in Figure 2, the method is applied to the authentication server and may include:
  • Step 201 receiving first authorization request information sent by the chip authorization tool, the first authorization request information includes chip identification information, project information and customer identity authentication information of the first chip.
  • the chip identification information is the serial number written into the EFUSE area of the one-time programmable memory after the chip leaves the factory, and once written into the EFUSE area, it cannot be changed.
  • Each chip has different and unique chip identification information from other chips, which is used to distinguish the identity of the chip.
  • the chip authorization tool when the chip is authorized to be deployed, applies to the authentication server through a unique encrypted channel and sends the first authorization request information.
  • the chip authorization tool needs to establish communication with the authentication server based on the client identity authentication information.
  • Step 202 Generate authorization ciphertext information of the first chip according to the chip identification information, project information and customer identity authentication information.
  • the authentication server may determine the chip authorization balance according to the customer identity authentication information, and if the chip authorization balance is not zero, it may determine the authorization list information of the first chip according to the chip identification information. After determining the authorization list information of the first chip, the authentication server will decrease the authorization balance of the first chip by one.
  • the authorization list information includes functions obtained by the first chip.
  • the authentication server may determine the authorization list information of the first chip according to the chip identification information and item information after determining that the chip authorization balance is not zero according to the client identity authentication information.
  • the authentication server will generate the first verification information based on the chip identification information, project information, customer identity authentication information and authorization list information, and then obtain the encryption key according to the project information of the first chip, and pass the encryption key pair
  • the chip identification information, project information, customer identity authentication information and authorization list information of the first chip are encrypted to form authorization ciphertext information of the first chip.
  • the authentication server stores an encryption key for encrypting the above information to form authorization ciphertext information, and the encryption key at the authentication server is a public key.
  • Step 203 sending the authorization ciphertext information to the chip authorization tool, so that the chip authorization tool deploys the authorization ciphertext information to the security partition of the first terminal device.
  • the authentication server sends the authorization ciphertext information of the first chip to the chip authorization tool through an encrypted channel, and the chip authorization tool writes the authorization ciphertext information into the security partition of the first terminal device, and the security partition may include replay Protected memory block (Replay Protected Memory Block, RPMB).
  • the authorization ciphertext information is stored in the security partition of the first terminal device, and the authorization ciphertext information will not be cleared if the first terminal device has a system upgrade or factory reset operation.
  • FIG. 3 is a flow chart of a chip verification method provided by an embodiment of the present application. As shown in Figure 3, the method is used for terminal equipment and may include:
  • Step 301 after the first chip restarts, read the authorization ciphertext information of the first chip from the security partition.
  • the diskless boot ROM interface bootrom inside the first chip loads the Second Program Loader (Second Program Loader, SPL) into the Static Random-Access Memory (Static Random-Access Memory, SRAM), after the SPL completes the initialization of the memory and related devices, it reads the authorization ciphertext information License in the secure partition.
  • SPL Second Program Loader
  • SRAM Static Random-Access Memory
  • Step 302 decrypt the authorized ciphertext information by using the decryption key to obtain the authorized plaintext information.
  • the first terminal device stores a decryption key for encrypting authorization ciphertext information to obtain authorization plaintext information, and the decryption key is a private key.
  • Step 303 determining chip identification information, project information, customer identity authentication information, authorization list information, and first verification information from the authorization plaintext information.
  • Step 304 verifying the chip identification information, the item information, the customer identity authentication information and the authorization list information according to the first verification information.
  • the terminal device first verifies whether the authorized plaintext information is authorized by the authentication server, and the information not authorized by the authentication server is in the original state, and can be based on the chip identification information, the project information, the customer identity authentication information, The arrangement format of the authorization list information and the first verification information, or, according to the authentication identifier in the authorization plain text information, verifies whether the authorization plain text information is authorized by the authentication server. Afterwards, according to the chip identification information, project information, customer identity authentication information and authorization list information to generate the second verification information, if the second verification information is consistent with the first verification information, then confirm the chip identification information, project information, The customer identity authentication information and authorization list information have not been tampered with. Finally, through the secure boot process, verify whether the authorized plaintext information is authorized by the manufacturer, preventing consumers from performing high-privilege operations such as reading, writing, and debugging on some key systems of the chip from the software and hardware levels.
  • Step 305 if the verification is passed, start the first chip; otherwise, the first chip fails to start, and enters the flashing process.
  • the verification is passed, and the first chip is started, and if one or more verifications fail, the terminal device enters the flashing process.
  • the authorization request information and the authorization list information are first encrypted by the authentication server to form the authorization ciphertext information and deployed to the chip, and then the authorization ciphertext information of the chip is decrypted to obtain the authorization plaintext information and verify whether the authorization plaintext information is tampered with.
  • Authorized deployment under the secure channel can query whether the user uses the chip according to the intention authorized by the chip manufacturer, and the authorized deployment of the terminal equipment production end can reduce the extra process of the chip production end.
  • FIG. 4 is a schematic structural diagram of a chip authorization device provided by an embodiment of the present application.
  • the chip authorization device in the embodiment of the present application can be used as a chip authorization device to implement the chip authorization method provided in the embodiment of the present application.
  • the chip authorization device may include: a receiving module 410 , a generating module 420 and a sending module 430 .
  • the receiving module 410 is configured to receive the first authorization request information sent by the chip authorization tool, where the first authorization request information includes chip identification information, project information and customer identity authentication information of the first chip.
  • the generation module 420 is configured to generate authorization ciphertext information of the first chip according to the chip identification information, the project information and the customer identity authentication information.
  • the sending module 430 is configured to send the authorization ciphertext information to the chip authorization tool, so that the chip authorization tool deploys the authorization ciphertext information to the security partition of the first terminal device.
  • FIG. 5 is a schematic structural diagram of a chip verification device provided by an embodiment of the present application.
  • the chip verification apparatus in the embodiment of the present application can be used as a chip verification device to implement the chip verification method provided in the embodiment of the present application.
  • the above chip verification device may include: a reading module 510 , a decryption module 520 , a determination module 530 , a verification module 540 and a driving module 550 .
  • the reading module 510 is configured to read the authorization ciphertext information of the first chip from the secure partition after the first chip restarts.
  • the decryption module 520 is configured to decrypt the authorization ciphertext information by using a decryption key to obtain authorization plaintext information.
  • the determining module 530 is configured to determine chip identification information, project information, customer identity authentication information, authorization list information and first verification information from the authorized plaintext information.
  • a verification module 540 configured to verify the chip identification information, the item information, the customer identity authentication information and the authorization list information according to the first verification information.
  • the driving module 550 is configured to start the first chip if the verification is passed, otherwise the first chip fails to start and enters the flashing process.
  • FIG. 6 is a schematic structural diagram of an electronic device provided in an embodiment of the present application. As shown in FIG. 6 , the electronic device is in the form of a general-purpose computing device.
  • the components of the electronic device may include, but are not limited to: one or more processors 610, a memory 630, and a communication bus 640 connecting different system components (including the memory 630 and the processor 610).
  • Communication bus 640 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus structures.
  • these architectures include but are not limited to Industry Standard Architecture (Industry Standard Architecture; hereinafter referred to as: ISA) bus, Micro Channel Architecture (Micro Channel Architecture; hereinafter referred to as: MAC) bus, enhanced ISA bus, video electronics Standards Association (Video Electronics Standards Association; hereinafter referred to as: VESA) local bus and Peripheral Component Interconnection (hereinafter referred to as: PCI) bus.
  • Electronic devices typically include a variety of computer system readable media. These media can be any available media that can be accessed by the electronic device and include both volatile and nonvolatile media, removable and non-removable media.
  • the memory 630 may include a computer system readable medium in the form of a volatile memory, such as a random access memory (Random Access Memory; hereinafter referred to as: RAM) and/or a cache memory.
  • the electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media.
  • a disk drive for reading and writing to a removable nonvolatile disk such as a "floppy disk”
  • a disk drive for a removable nonvolatile disk such as a CD-ROM (Compact Disc Read Only Memory; hereinafter referred to as: CD-ROM), Digital Video Disc Read Only Memory (hereinafter referred to as: DVD-ROM) or other optical media).
  • each drive may be connected to communication bus 640 through one or more data media interfaces.
  • Memory 630 may include at least one program product having a set (eg, at least one) of program modules configured to perform the functions of various embodiments of the present invention.
  • a program/utility having a set (at least one) of program modules may be stored in memory 630, such program modules including - but not limited to - an operating system, one or more application programs, other program modules, and program data , each or some combination of these examples may include implementations of network environments.
  • the program modules generally perform the functions and/or methodologies of the described embodiments of the invention.
  • the electronic device may also communicate with one or more external devices, and may also communicate with one or more devices that enable a user to interact with the electronic device, and/or communicate with one or more other computing devices. Any device that communicates (such as a network card, modem, etc.) communicates. Such communication may occur through communication interface 620 .
  • the electronic device can also communicate with one or more networks (such as a local area network (Local Area Network; hereinafter referred to as: LAN), a wide area network (Wide Area Network; hereinafter referred to as: WAN) and/or or a public network, such as the Internet), the above-mentioned network adapter can communicate with other modules of the electronic device through the communication bus 640 .
  • networks such as a local area network (Local Area Network; hereinafter referred to as: LAN), a wide area network (Wide Area Network; hereinafter referred to as: WAN) and/or or a public network, such as the Internet
  • RAID Redundant Arrays of Independent Drives
  • the processor 610 executes various functional applications and data processing by running the programs stored in the memory 630, for example, implementing the chip authorization method or the chip verification method provided by the embodiment of the present application.
  • the embodiment of the present application also provides a computer-readable storage medium, the above-mentioned computer-readable storage medium stores computer instructions, and the above-mentioned computer instructions cause the above-mentioned computer to execute the chip authorization method or the chip verification method provided by the embodiment of the present application.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a data signal carrying computer readable program code in baseband or as part of a carrier wave. Such propagated data signals may take many forms, including - but not limited to - electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device. .
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including - but not limited to - wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • first and second are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features.
  • the features defined as “first” and “second” may explicitly or implicitly include at least one of these features.
  • “plurality” means at least two, such as two, three, etc., unless otherwise specifically defined.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined Or it can be integrated into another system, or some features can be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware, or in the form of hardware plus software functional units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Evolutionary Computation (AREA)
  • Geometry (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种芯片授权和验证方法、装置和电子设备。先通过认证服务器对授权请求信息和授权列表信息进行加密形成授权密文信息并部署至芯片,再对芯片的授权密文信息进行解密得到授权明文信息并验证授权明文信息是否被篡改。

Description

芯片授权和验证方法、装置和电子设备
本申请要求于2021年12月03日提交中国专利局、申请号为202111463404.0、申请名称为“芯片授权和验证方法、装置和电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及芯片设计领域,尤其涉及一种芯片授权和验证方法、装置和电子设备。
背景技术
为了满足不同行业客户群体差异化需求,芯片厂商会在同一颗芯片上做差异化设计,并由于这些设计投入资源不同,需要有不同的授权来约束使用范围,并赋予不同售价。
现阶段对芯片授权的实现方案大多是找一个该芯片使用场景下的关键路径,在其必用组件中加密,并把授权数据藏在另一个组件中,在必用组件启动时进行授权数据比较。这种方案的缺陷是,工作量大,认证工作都在非安全区域,容易被破解。
发明内容
本申请实施例提供了一种芯片授权和验证方法、装置和电子设备,通过认证服务器对授权请求信息和授权列表信息进行加密形成授权密文信息并部署至芯片,再对芯片的授权密文信息进行解密得到授权明文信息并验证授权明文信息是否被篡改。在安全通路下进行授权部署,可以查询用户是否按芯片厂家授权的意图去使用芯片,并且生产端进行授权部署,可以减少芯片生产端的额外流程。
第一方面,本申请实施例提供了一种芯片授权方法,包括:
接收芯片授权工具发送的第一授权请求信息,所述第一授权请求信息包括第一芯片的芯片标识信息、项目信息和客户身份认证信息;
根据所述芯片标识信息、所述项目信息和所述客户身份认证信息,生成所述第一芯片的授权密文信息;
将所述授权密文信息发送给所述芯片授权工具,以使所述芯片授权工具将所授权密文信息部署至第一终端设备的安全分区。
一种可能的实现方式中,根据所述芯片标识信息、所述项目信息和所述客户身份认证信息,生成所述第一芯片的授权密文信息,包括:
根据所述芯片标识信息、所述项目信息和所述客户身份认证信息中的一项或多项的组合,确定所述第一芯片的授权列表信息,所述授权列表信息包含所述第一芯片获得的功能;
对所述授权列表信息进行至少一次加密,得到所述授权密文信息。
一种可能的实现方式中,根据所述芯片标识信息、所述项目信息和所述客户身份认证信息中的一项或多项的组合,确定所述第一芯片的授权列表信息,包括:
根据所述客户身份认证信息,确定芯片授权余额;
如果所述芯片授权余额不为零,则根据所述芯片标识信息确定第一芯片的授权列表信息,并且将所述芯片授权余额减一。
一种可能的实现方式中,根据所述芯片标识信息、所述项目信息和所述客户身份认证信息中的一项或多项的组合,确定所述第一芯片的授权列表信息,包括:
根据所述客户身份认证信息,确定芯片授权余额;
如果所述芯片授权余额不为零,则根据所述芯片标识信息和所述项目信息确定第一芯片的授权列表信息,并且将所述芯片授权余额减一。
一种可能的实现方式中,对所述授权列表信息进行至少一次加密,得到所述授权密文信息,包括:
基于所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息生成第一校验信息;
根据所述项目信息获取加密秘钥;
通过所述加密秘钥对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行加密形成所述授权密文信息。
第二方面,本申请实施例提供了一种芯片验证方法,包括:
第一芯片重启后,从安全分区读取第一芯片的授权密文信息;
通过解密密钥对所述授权密文信息进行解密,得到授权明文信息;
从所述授权明文信息中确定芯片标识信息、项目信息、客户身份认证信息、授权列表信息和第一校验信息;
根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证;若验证通过,则启动所述第一芯片,否则第一芯片启动失败,进入刷机流程。
一种可能的实现方式中,根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证,包括:
根据所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息生成第二校验信息;
若所述第二校验信息和所述第一校验信息比对一致,则确认所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息未被篡改。
一种可能的实现方式中,除了根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证之外,所述方法还包括:
根据所述芯片标识信息、所述项目信息、所述客户身份认证信息、所述授 权列表信息和所述第一校验信息的排布格式,或者,根据所述授权明文信息中的认证标识,验证所述授权明文信息是否经过认证服务器授权;
通过安全启动secure boot流程,验证所述授权明文信息是否经过生产厂商授权。
本申请实施例中,先通过认证服务器对授权请求信息和授权列表信息进行加密形成授权密文信息并部署至芯片,再对芯片的授权密文信息进行解密得到授权明文信息并验证授权明文信息是否被篡改。在安全通路下进行授权部署,可以查询用户是否按芯片厂家授权的意图去使用芯片,并且生产端进行授权部署,可以减少芯片生产端的额外流程。
第三方面,本申请实施例提供了一种芯片授权装置,包括:
接收模块,用于接收芯片授权工具发送的第一授权请求信息,所述第一授权请求信息包括第一芯片的芯片标识信息、项目信息和客户身份认证信息;
生成模块,用于根据所述芯片标识信息、所述项目信息和所述客户身份认证信息,生成所述第一芯片的授权密文信息;
发送模块,用于将所述授权密文信息发送给所述芯片授权工具,以使所述芯片授权工具将所授权密文信息部署至所述第一芯片。
第四方面,本申请实施例提供了一种芯片验证装置,包括:
读取模块,用于第一芯片重启后,从所述第一芯片的安全区读取第一芯片的授权密文信息;
解密模块,用于通过解密密钥对所述授权密文信息进行解密,得到授权明文信息;
确认模块,用于从所述授权明文信息中确定芯片标识信息、项目信息、客户身份认证信息、授权列表信息和第一校验信息;
验证模块,用于根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证;
驱动模块,用于若验证通过,则启动所述第一芯片,否则第一芯片启动失败,进入刷机流程。
第五方面,本申请实施例提供了一种电子设备,包括:
至少一个处理器;以及
与所述处理器通信连接的至少一个存储器,其中:
所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行第一方面或第二方面的方法。
第六方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行第一方面或第二方面的方法。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为本申请实施例提供的一种芯片授权设备的结构示意图;
图2为本申请实施例提供的一种芯片授权方法的流程图;
图3为本申请实施例提供的一种芯片验证方法的流程图;
图4为本申请实施例提供的一种芯片授权装置的结构示意图;
图5为本申请实施例提供的一种芯片验证装置的结构示意图;
图6为本申请实施例提供的一种电子设备的结构示意图。
具体实施方式
为了更好的理解本申请的技术方案,下面结合附图对本申请实施例进行详细描述。
应当明确,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。
在本申请实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。
图1为本申请实施例提供的一种芯片授权设备的结构示意图。如图1所示,可以包括:认证服务器110、芯片授权工具120、终端设备130、第一芯片140和安全分区150。
在终端设备130的生产过程中,认证服务器110需要对第一芯片140进行授权操作。芯片授权工具120将第一芯片140的第一授权请求信息发送至认证服务器110,认证服务器110在接收第一授权请求信息后对其加密形成授权密文信息,之后,认证服务器110将授权密文信息发送至芯片授权工具120,芯片授权工具120将授权密文信息存储至安全分区150。
上述芯片授权设备在对第一芯片进行授权时,芯片授权工具可以和认证服务器之间建立安全通路,加密形成的授权密文信息最终保存于安全分区,能够确保芯片厂家查询第一芯片的使用信息;并且芯片授权部署工作在终端设备生产时执行,减少了芯片生产端的额外流程。
图2为本申请实施例提供的一种芯片授权方法的流程图。如图2所示,该方法应用于认证服务器,可以包括:
步骤201,接收芯片授权工具发送的第一授权请求信息,第一授权请求信息包括第一芯片的芯片标识信息、项目信息和客户身份认证信息。
具体的,芯片标识信息为芯片出厂后写入一次性可编程存储器EFUSE区域的串号,EFUSE区域一旦写入无法更改。每个芯片具有与其他芯片不同且唯一的芯片标识信息,用于分辨芯片的身份。
一种实现方式中,对芯片进行授权部署时,芯片授权工具通过特有的加密通道向认证服务器提出申请并发送第一授权请求信息。芯片授权工具需要基于客户身份认证信息和认证服务器建立通信。
步骤202,根据芯片标识信息、项目信息和客户身份认证信息,生成第一芯片的授权密文信息。
一种实现方式中,认证服务器可以根据客户身份认证信息,确定芯片授权余额,如果芯片授权余额不为零,则可以根据芯片标识信息确定第一芯片的授权列表信息。确定第一芯片的授权列表信息之后,认证服务器会将第一芯片的授权余额减一。其中,授权列表信息包含第一芯片获得的功能。
一种实现方式中,认证服务器可以根据客户身份认证信息确定芯片授权余额不为零之后,还可以根据芯片标识信息和项目信息,确定第一芯片的授权列表信息。
一种实现方式中,认证服务器会基于芯片标识信息、项目信息、客户身份认证信息和授权列表信息生成第一校验信息,再根据第一芯片的项目信息获取加密秘钥,通过加密秘钥对第一芯片的芯片标识信息、项目信息、客户身份认证信息和授权列表信息进行加密形成第一芯片的授权密文信息。
具体的,认证服务器保存有加密秘钥,用于对上述信息进行加密形成授权密文信息,认证服务器端的加密秘钥为公钥。
步骤203,将授权密文信息发送给芯片授权工具,以使芯片授权工具将授权密文信息部署至第一终端设备的安全分区。
一种实现方式中,认证服务器将第一芯片的授权密文信息通过加密通道发送给芯片授权工具,芯片授权工具将授权密文信息写入第一终端设备的安全分区,安全分区可以包括重放保护内存块(Replay Protected Memory Block,RPMB)。授权密文信息存储在第一终端设备的安全分区中,如果第一终端设备有系统升级或恢复出厂设置的操作,授权密文信息不会被清除。
图3为本申请实施例提供的一种芯片验证方法的流程图。如图3所示,该方法用于终端设备,可以包括:
步骤301,第一芯片重启后,从安全分区读取第一芯片的授权密文信息。
一种实现方式中,第一芯片重启后,第一芯片内部的无盘启动ROM接口bootrom将二级程序加载器(Second Program Loader,SPL)加载至静态随机存取存储器(Static Random-Access Memory,SRAM),SPL完成内存和相关设备的初始化后,在安全分区读取授权密文信息License。
步骤302,通过解密密钥对授权密文信息进行解密,得到授权明文信息。
一种实现方式中,第一终端设备设备保存有解密秘钥,用于加密授权密文信息,得到授权明文信息,该解密秘钥为私钥。
步骤303,从所述授权明文信息中确定芯片标识信息、项目信息、客户身份认证信息、授权列表信息和第一校验信息。
步骤304,根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证。
一种实现方式中,终端设备先验证授权明文信息是否经过认证服务器授权,未经认证服务器授权的信息处于原始状态,可以根据所述芯片标识信息、所述项目信息、所述客户身份认证信息、所述授权列表信息和所述第一校验信息的排布格式,或者,根据所述授权明文信息中的认证标识,验证所述授权明文信息是否经过认证服务器授权。之后,根据芯片标识信息、项目信息、客户身份认证信息和授权列表信息生成第二校验信息,若第二校验信息和第一校验信息比对一致,则确认芯片标识信息、项目信息、客户身份认证信息和授权列表信息未被篡改。最后,通过安全启动secure boot流程,验证所述授权明文信息是否经过生产厂商授权,防止消费者从软硬件层面对芯片的部分关键系统进 行读写、调试等高权限的操作。
步骤305,若验证通过,则启动第一芯片,否则第一芯片启动失败,进入刷机流程。
若上述三种验证全部成功,则验证通过,启动第一芯片,若存在一种及以上的验证失败,则终端设备进入刷机流程。
本申请实施例中,先通过认证服务器对授权请求信息和授权列表信息进行加密形成授权密文信息并部署至芯片,再对芯片的授权密文信息进行解密得到授权明文信息并验证授权明文信息是否被篡改。在安全通路下进行授权部署,可以查询用户是否按芯片厂家授权的意图去使用芯片,并且终端设备生产端进行授权部署,可以减少芯片生产端的额外流程。
图4为本申请实施例提供的一种芯片授权装置的结构示意图。本申请实施例中的芯片授权装置可以作为芯片授权设备实现本申请实施例提供的芯片授权方法。如图4所示,上述芯片授权装置可以包括:接收模块410、生成模块420和发送模块430。
接收模块410,用于接收芯片授权工具发送的第一授权请求信息,所述第一授权请求信息包括第一芯片的芯片标识信息、项目信息和客户身份认证信息。
生成模块420,用于根据所述芯片标识信息、所述项目信息和所述客户身份认证信息,生成所述第一芯片的授权密文信息。
发送模块430,用于将所述授权密文信息发送给所述芯片授权工具,以使所述芯片授权工具将所述授权密文信息部署至第一终端设备的安全分区。
图5为本申请实施例提供的一种芯片验证装置的结构示意图。本申请实施例中的芯片验证装置可以作为芯片验证设备实现本申请实施例提供的芯片验证方法。如图5所示,上述芯片验证装置可以包括:读取模块510、解密模块520、确定模块530、验证模块540和驱动模块550。
读取模块510,用于第一芯片重启后,从安全分区读取第一芯片的授权密文信息。
解密模块520,用于通过解密密钥对所述授权密文信息进行解密,得到授权明文信息。
确定模块530,从所述授权明文信息中确定芯片标识信息、项目信息、客户身份认证信息、授权列表信息和第一校验信息。
验证模块540,用于根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证。
驱动模块550,用于若验证通过,则启动所述第一芯片,否则第一芯片启动失败,进入刷机流程。
图6为本申请实施例提供的一种电子设备的结构示意图,如图6所示,电子设备以通用计算设备的形式表现。电子设备的组件可以包括但不限于:一个或者多个处理器610,存储器630,连接不同系统组件(包括存储器630和处理器610)的通信总线640。
通信总线640表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。举例来说,这些体系结构包括但不限于工业标准体系结构(Industry Standard Architecture;以下简称:ISA)总线,微通道体系结构(Micro Channel Architecture;以下简称:MAC)总线,增强型ISA总线、视频电子标准协会(Video Electronics Standards Association;以下简称:VESA)局域总线以及外围组件互连(Peripheral Component Interconnection;以下简称:PCI)总线。
电子设备典型地包括多种计算机系统可读介质。这些介质可以是任何能够被电子设备访问的可用介质,包括易失性和非易失性介质,可移动的和不可移动的介质。
存储器630可以包括易失性存储器形式的计算机系统可读介质,例如随机存 取存储器(Random Access Memory;以下简称:RAM)和/或高速缓存存储器。电子设备可以进一步包括其它可移动/不可移动的、易失性/非易失性计算机系统存储介质。尽管图6中未示出,可以提供用于对可移动非易失性磁盘(例如“软盘”)读写的磁盘驱动器,以及对可移动非易失性光盘(例如:光盘只读存储器(Compact Disc Read Only Memory;以下简称:CD-ROM)、数字多功能只读光盘(Digital Video Disc Read Only Memory;以下简称:DVD-ROM)或者其它光介质)读写的光盘驱动器。在这些情况下,每个驱动器可以通过一个或者多个数据介质接口与通信总线640相连。存储器630可以包括至少一个程序产品,该程序产品具有一组(例如至少一个)程序模块,这些程序模块被配置以执行本发明各实施例的功能。
具有一组(至少一个)程序模块的程序/实用工具,可以存储在存储器630中,这样的程序模块包括——但不限于——操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。程序模块通常执行本发明所描述的实施例中的功能和/或方法。
电子设备也可以与一个或多个外部设备通信,还可与一个或者多个使得用户能与该电子设备交互的设备通信,和/或与使得该电子设备能与一个或多个其它计算设备进行通信的任何设备(例如网卡,调制解调器等等)通信。这种通信可以通过通信接口620进行。并且,电子设备还可以通过网络适配器(图6中未示出)与一个或者多个网络(例如局域网(Local Area Network;以下简称:LAN),广域网(Wide Area Network;以下简称:WAN)和/或公共网络,例如因特网)通信,上述网络适配器可以通过通信总线640与电子设备的其它模块通信。应当明白,尽管图6中未示出,可以结合电子设备使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、磁盘阵列(Redundant Arrays of Independent Drives;以下简称:RAID)系统、磁带驱动器以及数据备份存储系统等。
处理器610通过运行存储在存储器630中的程序,从而执行各种功能应用以及数据处理,例如实现本申请实施例提供的芯片授权方法或芯片验证方法。
本申请实施例还提供一种计算机可读存储介质,上述计算机可读存储介质存储计算机指令,上述计算机指令使上述计算机执行本申请实施例提供的芯片授权方法或芯片验证方法。
上述计算机可读存储介质可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(RAM)、只读存储器(Read Only Memory;以下简称:ROM)、可擦式可编程只读存储器(Erasable Programmable Read Only Memory;以下简称:EPROM)或闪存、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本文件中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括——但不限于——电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括——但不限于——无线、电线、光缆、RF等等,或者上述的任意合适的组合。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、 “具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现定制逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本发明的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所属技术领域的技术人员所理解。
在本发明所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的 形式实现。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明保护的范围之内。

Claims (12)

  1. 一种芯片授权方法,其特征在于,所述方法包括:
    接收芯片授权工具发送的第一授权请求信息,所述第一授权请求信息包括第一芯片的芯片标识信息、项目信息和客户身份认证信息;
    根据所述芯片标识信息、所述项目信息和所述客户身份认证信息,生成所述第一芯片的授权密文信息;
    将所述授权密文信息发送给所述芯片授权工具,以使所述芯片授权工具将所述授权密文信息部署至第一终端设备的安全分区。
  2. 根据权利要求1所述的方法,其特征在于,根据所述芯片标识信息、所述项目信息和所述客户身份认证信息,生成所述第一芯片的授权密文信息,包括:
    根据所述芯片标识信息、所述项目信息和所述客户身份认证信息中的一项或多项的组合,确定所述第一芯片的授权列表信息,所述授权列表信息包含所述第一芯片获得的功能;
    对所述授权列表信息进行至少一次加密,得到所述授权密文信息。
  3. 根据权利要求2所述的方法,其特征在于,根据所述芯片标识信息、所述项目信息和所述客户身份认证信息中的一项或多项的组合,确定所述第一芯片的授权列表信息,包括:
    根据所述客户身份认证信息,确定芯片授权余额;
    如果所述芯片授权余额不为零,则根据所述芯片标识信息确定第一芯片的授权列表信息,并且将所述芯片授权余额减一。
  4. 根据权利要求2所述的方法,其特征在于,根据所述芯片标识信息、所述项目信息和所述客户身份认证信息中的一项或多项的组合,确定所述第一芯片的授权列表信息,包括:
    根据所述客户身份认证信息,确定芯片授权余额;
    如果所述芯片授权余额不为零,则根据所述芯片标识信息和所述项目信息确定第一芯片的授权列表信息,并且将所述芯片授权余额减一。
  5. 根据权利要求2所述的方法,其特征在于,对所述授权列表信息进行至少一次加密,得到所述授权密文信息,包括:
    基于所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息生成第一校验信息;
    根据所述项目信息获取加密秘钥;
    通过所述加密秘钥对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行加密形成所述授权密文信息。
  6. 一种芯片验证方法,其特征在于,所述方法应用于终端设备,包括:
    第一芯片重启后,从安全分区读取第一芯片的授权密文信息;
    通过解密密钥对所述授权密文信息进行解密,得到授权明文信息;
    从所述授权明文信息中确定芯片标识信息、项目信息、客户身份认证信息、授权列表信息和第一校验信息;
    根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证;
    若验证通过,则启动所述第一芯片,否则第一芯片启动失败,进入刷机流程。
  7. 根据权利要求6所述的方法,其特征在于,根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证,包括:
    根据所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息生成第二校验信息;
    若所述第二校验信息和所述第一校验信息比对一致,则确认所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息未被篡 改。
  8. 根据权利要求7所述的方法,其特征在于,除了根据所述第一校验信息对所述芯片标识信息、所述项目信息、所述客户身份认证信息和所述授权列表信息进行验证之外,所述方法还包括:
    根据所述芯片标识信息、所述项目信息、所述客户身份认证信息、所述授权列表信息和所述第一校验信息的排布格式,或者,根据所述授权明文信息中的认证标识,验证所述授权明文信息是否经过认证服务器授权;
    通过安全启动secure boot流程,验证所述授权明文信息是否经过生产厂商授权。
  9. 一种芯片授权装置,其特征在于,包括:
    接收模块,用于接收芯片授权工具发送的第一授权请求信息,所述第一授权请求信息包括第一芯片的芯片标识信息、项目信息和客户身份认证信息;
    生成模块,用于根据所述芯片标识信息、所述项目信息和所述客户身份认证信息,生成所述第一芯片的授权密文信息;
    发送模块,用于将所述授权密文信息发送给所述芯片授权工具,以使所述芯片授权工具将所述授权密文信息部署至第一终端设备的安全分区。
  10. 一种芯片验证装置,其特征在于,所述装置应用于终端设备,包括:
    读取模块,用于第一芯片重启后,从安全区读取第一芯片的授权密文信息;
    解密模块,用于通过解密密钥对所述授权密文信息进行解密,得到授权明文信息;
    确定模块,用于从所述授权明文信息中确定芯片标识信息、项目信息、客户身份认证信息、授权列表信息和第一校验信息;
    验证模块,用于根据所述第一校验信息对所述芯片标识信息、所述项目 信息、所述客户身份认证信息和所述授权列表信息进行验证;
    驱动模块,用于若验证通过,则启动所述第一芯片,否则第一芯片启动失败,进入刷机流程。
  11. 一种电子设备,其特征在于,包括:
    至少一个处理器;以及
    与所述处理器通信连接的至少一个存储器,其中:
    所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行如权利要求1至5任一项或6至8任一项所述的方法。
  12. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行如权利要求1至5任一项或6至8任一项所述的方法。
PCT/CN2022/135082 2021-12-03 2022-11-29 芯片授权和验证方法、装置和电子设备 WO2023098671A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111463404.0A CN114154443A (zh) 2021-12-03 2021-12-03 芯片授权和验证方法、装置和电子设备
CN202111463404.0 2021-12-03

Publications (1)

Publication Number Publication Date
WO2023098671A1 true WO2023098671A1 (zh) 2023-06-08

Family

ID=80456064

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/135082 WO2023098671A1 (zh) 2021-12-03 2022-11-29 芯片授权和验证方法、装置和电子设备

Country Status (2)

Country Link
CN (1) CN114154443A (zh)
WO (1) WO2023098671A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114154443A (zh) * 2021-12-03 2022-03-08 展讯通信(上海)有限公司 芯片授权和验证方法、装置和电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363031A (zh) * 2018-03-26 2019-10-22 北京华大信安科技有限公司 一种ip核授权方法、装置及pld
CN112118211A (zh) * 2019-06-20 2020-12-22 北京京东尚科信息技术有限公司 设备通信方法、装置、系统、介质及电子设备
CN112585608A (zh) * 2020-01-13 2021-03-30 深圳市大疆创新科技有限公司 嵌入式设备、合法性识别方法、控制器及加密芯片
CN113505361A (zh) * 2021-07-16 2021-10-15 无锡安可芯信息技术有限公司 面向asic和fpga器件的加密数字ip核授权方法
CN114154443A (zh) * 2021-12-03 2022-03-08 展讯通信(上海)有限公司 芯片授权和验证方法、装置和电子设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363031A (zh) * 2018-03-26 2019-10-22 北京华大信安科技有限公司 一种ip核授权方法、装置及pld
CN112118211A (zh) * 2019-06-20 2020-12-22 北京京东尚科信息技术有限公司 设备通信方法、装置、系统、介质及电子设备
CN112585608A (zh) * 2020-01-13 2021-03-30 深圳市大疆创新科技有限公司 嵌入式设备、合法性识别方法、控制器及加密芯片
CN113505361A (zh) * 2021-07-16 2021-10-15 无锡安可芯信息技术有限公司 面向asic和fpga器件的加密数字ip核授权方法
CN114154443A (zh) * 2021-12-03 2022-03-08 展讯通信(上海)有限公司 芯片授权和验证方法、装置和电子设备

Also Published As

Publication number Publication date
CN114154443A (zh) 2022-03-08

Similar Documents

Publication Publication Date Title
US8364975B2 (en) Methods and apparatus for protecting data
US9684789B2 (en) Arbitrary code execution and restricted protected storage access to trusted code
US6684326B1 (en) Method and system for authenticated boot operations in a computer system of a networked computing environment
TWI277904B (en) Method, recording medium and system for protecting information
JP5129121B2 (ja) ハードディスク認証
US8560820B2 (en) Single security model in booting a computing device
US8127146B2 (en) Transparent trust validation of an unknown platform
US6754826B1 (en) Data processing system and method including a network access connector for limiting access to the network
US7861015B2 (en) USB apparatus and control method therein
JP4848458B2 (ja) 永続的セキュリティシステム及び永続的セキュリティ方法
US20080163383A1 (en) Methods and apparatus for authenticating components of processing systems
US20080082813A1 (en) Portable usb device that boots a computer as a server with security measure
US11269984B2 (en) Method and apparatus for securing user operation of and access to a computer system
WO2017041603A1 (zh) 数据加密方法、装置及移动终端、计算机存储介质
CN113557703B (zh) 网络摄像机的认证方法和装置
US20080022099A1 (en) Information transfer
TW201447759A (zh) 用於管理及診斷配備有統一可延伸韌體介面(uefi)相容韌體的計算裝置之系統與方法
US9678766B2 (en) Controlling the configuration of computer systems
JP2007226667A (ja) データ処理装置、データ処理方法及びプログラム
WO2012075904A1 (zh) 一种验证绑定数据卡和移动主机的方法、装置及系统
JP2004295358A (ja) 情報処理装置、その暗号処理システム及び外部記憶装置の制御方法
WO2023098671A1 (zh) 芯片授权和验证方法、装置和电子设备
CN115943381A (zh) 一种数据加解密方法和装置
JP2008005408A (ja) 記録データ処理装置
CN109960935B (zh) 确定tpm可信状态的方法、装置及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22900475

Country of ref document: EP

Kind code of ref document: A1