[go: up one dir, main page]

CN113032791A - IP core, IP core management method and chip - Google Patents

IP core, IP core management method and chip Download PDF

Info

Publication number
CN113032791A
CN113032791A CN202110357723.7A CN202110357723A CN113032791A CN 113032791 A CN113032791 A CN 113032791A CN 202110357723 A CN202110357723 A CN 202110357723A CN 113032791 A CN113032791 A CN 113032791A
Authority
CN
China
Prior art keywords
core
correct
key
processed
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110357723.7A
Other languages
Chinese (zh)
Other versions
CN113032791B (en
Inventor
胡逸众
樊俊锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Open Security Research Inc
Original Assignee
Open Security Research Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Open Security Research Inc filed Critical Open Security Research Inc
Priority to CN202110357723.7A priority Critical patent/CN113032791B/en
Publication of CN113032791A publication Critical patent/CN113032791A/en
Application granted granted Critical
Publication of CN113032791B publication Critical patent/CN113032791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The IP core, the management method of the IP core and the chip provided by the invention receive the key input from the outside; further judging whether the secret key is correct, if so, processing the received data to be processed, and outputting a correct processing result; and if the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability. Therefore, the complete function of the IP core can be used only when the correct key is obtained, the IP core is prevented from being abused, and intellectual property rights of products such as the IP core and the like are protected.

Description

IP core, IP core management method and chip
Technical Field
The invention relates to the field of chip design, in particular to an IP core, a management method of the IP core and a chip.
Background
At present, the design scale of chips is increasingly huge, and for chip development, chip companies are difficult to finish all design works independently. Often, chip companies reduce the complexity of the design by purchasing third-party hardware IP cores, focusing limited resources on the development of the critical modules of the integrated design core. The form of the hardware IP core may be various, including software code (hardware description language), netlist, or layout (GDS). For a hardware IP core, especially for a front-end digital IP, the method has the characteristic of strong applicability, namely, the method can be quickly adapted to other chip items, which causes the problem that the IP of a hardware IP core manufacturer is easily used on unauthorized chip products, and the intellectual property right is infringed.
Disclosure of Invention
The invention provides an IP core, a management method of the IP core and a chip, and aims to protect intellectual property of the IP core.
An embodiment provides a management method of an IP core, including:
receiving an externally input key;
judging whether the secret key is correct or not, if so, processing the received data to be processed, and outputting a correct processing result; and if the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability.
In the management method, the processing the received data to be processed and outputting an erroneous processing result with a preset probability includes:
judging whether the received data to be processed belongs to preset special data or not, if so, processing the data to be processed, and outputting an error processing result; otherwise, processing the data to be processed and outputting a correct processing result; the occupation ratio of the special data in all possible data to be processed is the preset probability.
In the management method, the preset probability is not more than 1%.
In the management method, the determining whether the key is correct includes:
judging whether the secret key belongs to a preset secret key set or not, if so, determining that the secret key is correct, and otherwise, determining that the secret key is incorrect; the set of keys includes a plurality of correct keys.
An embodiment provides an IP core comprising:
the key verification module is used for receiving an externally input key and judging whether the key is correct or not;
the data processing module is used for processing the received data to be processed when the secret key is correct and outputting a correct processing result; and when the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability.
In the IP core, the data processing module processes the received data to be processed, and outputs an erroneous processing result with a preset probability, including:
judging whether the received data to be processed belongs to preset special data or not, if so, processing the data to be processed, and outputting an error processing result; otherwise, processing the data to be processed and outputting a correct processing result; the occupation ratio of the special data in all possible data to be processed is the preset probability.
In the IP core, the preset probability is not more than 1%.
In the IP core, the determining, by the key verification module, whether the key is correct includes:
judging whether the secret key belongs to a preset secret key set or not, if so, determining that the secret key is correct, and otherwise, determining that the secret key is incorrect; the set of keys includes a plurality of correct keys.
An embodiment provides a chip, wherein part of circuits of the chip are manufactured according to the IP core.
An embodiment provides a computer readable storage medium having a program stored thereon, the program being executable by a processor to implement a method as described above.
According to the IP core, the management method of the IP core and the chip of the embodiment, the key input from the outside is received; further judging whether the secret key is correct, if so, processing the received data to be processed, and outputting a correct processing result; and if the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability. Therefore, the complete function of the IP core can be used only when the correct key is obtained, the IP core is prevented from being abused, and intellectual property rights of products such as the IP core and the like are protected.
Drawings
FIG. 1 is a block diagram of an embodiment of an IP core provided in the present invention;
FIG. 2 is a flowchart of an embodiment of a method for managing an IP core according to the present invention;
FIG. 3 is a flowchart of an embodiment of a method for managing an IP core according to the present invention;
fig. 4 is a block diagram of an IP core circuit in the chip provided by the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following detailed description and accompanying drawings. Wherein like elements in different embodiments are numbered with like associated elements. In the following description, numerous details are set forth in order to provide a better understanding of the present application. However, those skilled in the art will readily recognize that some of the features may be omitted or replaced with other elements, materials, methods in different instances. In some instances, certain operations related to the present application have not been shown or described in detail in order to avoid obscuring the core of the present application from excessive description, and it is not necessary for those skilled in the art to describe these operations in detail, so that they may be fully understood from the description in the specification and the general knowledge in the art.
Furthermore, the features, operations, or characteristics described in the specification may be combined in any suitable manner to form various embodiments. Also, the various steps or actions in the method descriptions may be transposed or transposed in order, as will be apparent to one of ordinary skill in the art. Thus, the various sequences in the specification and drawings are for the purpose of describing certain embodiments only and are not intended to imply a required sequence unless otherwise indicated where such sequence must be followed.
The numbering of the components as such, e.g., "first", "second", etc., is used herein only to distinguish the objects as described, and does not have any sequential or technical meaning. The term "connected" and "coupled" when used in this application, unless otherwise indicated, includes both direct and indirect connections (couplings).
As shown in fig. 1, the IP core provided by the present invention includes a key verification module 10 and a data processing module 20. The IP core is an intellectual property core or an intellectual property module. The IP core is mainly divided into a soft IP (core), a fixed IP (core), and a hard IP (core). The soft IP may be, for example, a functional block (software code) described in a hardware description language. The hard IP may be, for example, a layout (GDS) by which a mask for producing a chip is fabricated. The fixed IP is an intermediate form of the soft IP and the hard IP, such as a netlist.
The key verification module 10 is configured to receive an externally input key and determine whether the key is correct; the judgment result is output to the data processing module 20. For soft IP cores, the key verification module 10 may be a functional module. For a hard IP core, the key verification module 10 may be a digital logic circuit. For a fixed IP core, key verification module 10 may be a netlist that reflects the digital logic circuit.
The data processing module 20 is configured to process the received data to be processed when the secret key is correct, and output a correct processing result; and when the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability. Therefore, the complete function of the IP core can be used only when the correct key is obtained, the IP core is prevented from being abused, and intellectual property rights of products such as the IP core and the like are protected. Moreover, the invention can output correct processing results with a certain probability when the key is wrong, so that if other people want to crack the key, correct data processing results can still be obtained after cracking fails, the key is easy to be mistaken into cracked, and finally, the abuse of the IP core once is avoided. Even if other people know that the processing result output by the IP core has a certain probability of error when the secret key is incorrect, when other people want to crack the secret key, whether the cracking is successful or not, the accuracy of the data processing result needs to be repeatedly verified, the cracking cost is high, the condition that the IP core is abused is effectively reduced, and the intellectual property of the IP core is protected. Likewise, for a soft IP core, the data processing module 20 may be a functional module. For a hard IP core, the data processing block 20 may be a digital logic circuit. For a fixed IP core, data processing block 20 may be a netlist that reflects the digital logic circuit.
As shown in fig. 2, the process of data processing by the IP core includes the following steps:
step 1, the key verification module 10 receives an externally input key and data to be processed, and the two may be sequentially input to the IP core or may be input to the IP core together.
Step 2, the key verification module 10 judges whether the received key is correct, and if the key is correct, the step 4 is entered; if the key is not correct, step 3 is entered. Specifically, the key verification module 10 may determine whether the key belongs to a preset key set, determine that the key is correct if the key belongs to the preset key set, and determine that the key is incorrect if the key belongs to the preset key set. A key set is a set of multiple correct keys. In other words, the same IP core may have multiple correct keys, and an IP manufacturer only needs to provide different keys to different chip manufacturers, thereby ensuring the reusability of the IP core circuit, and after the hardware IP core is delivered, the source and the evidence can be obtained by giving different key values to different chip manufacturers.
And 3, processing the received data to be processed by the data processing module 20, and outputting an error processing result according to a preset probability. In some embodiments, the predetermined probability is not more than 1%, preferably, the predetermined probability is not more than 0.3%, not more than 0.1%, or between 0.1% and 0.3%. Chips on the market are usually designed and verified at an early stage, and then are produced in mass production to form final products. The chip vendor typically evaluates the IP cores of at least one IP vendor during the chip design phase. If the IP core is encrypted by simply adopting the key, IP manufacturers need to provide the IP cores using different keys for each chip manufacturer for the same IP core, and the maintenance and management cost of the IP core is high. In addition, although the chip is designed and even verified, the chip is not always mass-produced for various reasons, which easily causes the key provided by the IP manufacturer in the early stage to be abused (stolen), is not beneficial to the protection of the IP core, and brings loss to the hardware IP core manufacturer. At present, hardware IP core manufacturers often judge whether abuse is caused by embedding a serial number in an IP product. However, since the function of the IP core is not affected by tampering the serial number, the method cannot fundamentally solve the misuse situation, and is only a method for obtaining evidence and proving. Even if the key is wrong, the data processing module 20 can correctly process more than 99% of data, so that when a chip manufacturer designs and verifies the chip, the IP manufacturer does not need to provide the key, the security of the key is improved, a public edition of the IP core can be issued to be evaluated by a plurality of chip manufacturers, and the maintenance cost of the IP core is reduced; in addition, the accuracy of more than 99 percent can also meet the requirements of chip manufacturers for designing and verifying chips. When the chip enters a mass production stage or a product stage, the IP manufacturer provides the key to the chip manufacturer, and the chip manufacturer writes the key into a starting process of the SoC, so that the IP core is prevented from being abused. The present embodiment is described by taking the preset probability of 0.3% as an example.
Specifically, the data processing module 20 includes a judging unit 210, a correct processing unit 220, and an error processing unit 230. As shown in fig. 3, this step may include:
step 3.1, the determining unit 210 determines whether the received data to be processed belongs to the preset special data, if so, step 3.2 is performed, otherwise, step 4 is performed. The occupation ratio of the special data in all possible data to be processed is the preset probability. For example, the data to be processed is n bits of binary data, n is an integer greater than 0, the determining unit 210 determines whether the k preset designated bits are preset values, if yes, it is determined that the data to be processed belongs to the preset special data, otherwise, it is determined that the data to be processed does not belong to the preset special data. k is an integer greater than 0 and less than n,
Figure BDA0003004154420000051
i.e. the preset probability.
And 3.2, performing second processing on the data to be processed by the error processing unit 230, and outputting an error processing result. The second process is performed in various ways, and only the wrong result needs to be output, and the number of binary bits of the wrong result can be the same as that of the data to be processed, namely n bits.
And 4, performing first processing on the received to-be-processed data by the correct processing unit 220, and outputting a correct processing result. The correct processing unit 220 performs the main or core function of the IP core, for example, if the IP core is an IP core with an addition carry, the normal processing unit 220 is used to calculate the sum of a plurality of input values, and the error processing unit 230 ignores the carry between bits and performs an addition operation without a carry.
The function of the key may be used to start the correct processing unit 220, or to run the correct processing unit 220, in other words, after inputting the correct key once, the subsequently received data to be processed is processed by the correct processing unit 220, that is, only the correct key needs to be input once; the key and the data to be processed may also be input to the IP core, and after the key is determined to be correct, the correct processing unit 220 processes the data to be processed that is input together, that is, the key needs to be input once each time the data to be processed is processed.
Specifically, the operation logic of the IP core (the key verification module 10 and the data processing module 20) may be a mapping function, and in this embodiment, the mapping function is designed based on a cryptographic algorithm and implemented by using hardware codes. The mapping function has two inputs, namely a data input to be processed and a key input; there is a data output of the same length as the data input to be processed. Under the condition that the key is correct, the input data to be processed can be output through correct calculation. In the case of an incorrect key, the output result may be made incorrect when the input is some special value, which may cause the wrong input value to be about 0.3% of the total input. This will make the entire chip work normally in most scenarios, but in some extreme cases it will work incorrectly. Only if the key is correct, it can be guaranteed that the correct output can be obtained no matter what value is input. The key may be included in an SDK (Software Development Kit) provided to a chip vendor, and the key may not be included in a hardware circuit.
The following mapping functions are illustrated.
For circuits in a conventional IP core (circuit diagrams in the fixed IP and the hard IP, and software code that can be converted into a circuit diagram, i.e., a functional block, in the soft IP), the function can be abstracted as a feature matrix B. An n-bit binary input a ═ a0 … an-1]After passing through this circuit (feature matrix B), n-bit output C ═ C is obtained0 … cn-1]。
Figure BDA0003004154420000061
In order to achieve the purpose of protecting the hardware IP core, we modify the feature matrix B of the existing IP core, and for some specific a (preset special data), we have a modified feature matrix B', as follows:
Figure BDA0003004154420000062
in this case, the output C' does not coincide with the desired output C, which may cause errors in subsequent operations. To control that only a small fraction (e.g. 0.3% probability mentioned above) of the operations are performed using B' (corresponding to the error handling unit 230), we randomly select the special A subset AX (predetermined special data) in advance, for example, we can define [ a ]0 … an-k]=[1 … 1]B' is used in the calculation of the value of (A), so that
Figure BDA0003004154420000063
May cause errors (e.g., when n is 32 and k is 27, an error rate of approximately 0.3% may be satisfied). Our purpose is to avoid unauthorized use, so B' will only be introduced if not authorized. A key value k can be introduced0To ensure that when the correct k is input externally0In the case of (2), B' is not introduced and B is still kept in use (corresponding to correct processing)Unit 220).
In order to ensure the reusability of the circuit, more than one key value needs to be introduced, so that when the hardware IP core is delivered, the source can be operated by giving different key values to different customers. I.e. there are also other key values k1、k2、…、kmI.e. when the entered key value does not belong to the set K ═ K0、k1、k2、…、kmWhen the input values (data to be processed) belong to the set AX, the feature matrix B is replaced with B'. We can recombine K, AX, B and B' into a new feature matrix, which is used to replace the original feature matrix B, input these designed matrix modules into an EDA (electronic design automation) tool, and generate corresponding circuits by the EDA tool to integrate into the hardware IP core.
This key value K is ultimately given by the application software and is not provided at the chip design stage. The key value may be part of the boot firmware or the running firmware and contains a special field header that can be easily identified. After the chip is produced, the IP vendor will formally deliver the key to the chip vendor along with the SDK. Since there is more than one key, the same mapping function can be used with different correct keys as a unique identification provided to a certain chip manufacturer.
The above process is also a management method, a use method or a protection method of the IP core. By designing some of the critical operational logic in the circuit as a mapping function that requires an external input of a key, the mapping function can map its function correctly if the key is correct. In the case of incorrect key input, most inputs can be mapped to correct outputs, but mapping of a part of the inputs is incorrect, that is, correct outputs cannot be obtained, so that the function is incorrect. Thus, the key is necessary in contrast to the current use of only a serial number that is not function related as an identification. The invention does not affect the integrated evaluation and verification of the chip to the IP core under the condition of not having a correct key, and can completely carry out small-scale test evaluation under the condition of not having a correct key. The key may also serve as a unique identification number for the chip item from which source tracing and forensics may be performed. Therefore, the IP core is well protected from being embezzled and abused, and the intellectual property of the IP core is protected.
Based on the IP core, the chip provided by the invention comprises at least one IP core, in other words, partial circuit of the chip is manufactured according to the IP core. Correspondingly, as shown in fig. 4, the chip includes an IP core circuit including a key verification circuit 10 'and a data processing circuit 20'.
The key verification circuit 10 'is configured to receive an externally input key, determine whether the key is correct, and output a determination result to the data processing circuit 20'. That is, the key verification circuit 10 'functions identically to the key verification module 10, except that the key verification circuit 10' is in the form of an integrated circuit in a chip.
The data processing circuit 20' is configured to process the received data to be processed when the secret key is correct, and output a correct processing result; and when the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability. Likewise, data processing circuit 20 'functions identically to data processing module 20, except that data processing circuit 20' is in the form of an integrated circuit in a chip.
Data processing circuit 20 'includes a decision sub-circuit 210', a correct processing sub-circuit 220 ', and an error processing sub-circuit 230'. The judgment sub-circuit 210 'is configured to judge whether the received data to be processed belongs to preset special data, and if so, start the error processing sub-circuit 230' to perform a second type of processing on the data to be processed, and output an error processing result; if the data to be processed does not belong to the preset special data, the correct processing sub-circuit 220' is activated to perform the first processing on the received data to be processed, and output a correct processing result. That is, the functions of the judgment sub-circuit 210 ', the correct processing sub-circuit 220 ' and the error processing sub-circuit 230 ' are respectively the same as the judgment unit 210, the correct processing unit 220 and the error processing unit 230 of the above embodiments, but each sub-circuit is presented in the form of an integrated circuit in a chip, and details are not described herein.
Those skilled in the art will appreciate that all or part of the functions of the various methods in the above embodiments may be implemented by hardware, or may be implemented by computer programs. When all or part of the functions of the above embodiments are implemented by a computer program, the program may be stored in a computer-readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc., and the program is executed by a computer to realize the above functions. For example, the program may be stored in a memory of the device, and when the program in the memory is executed by the processor, all or part of the functions described above may be implemented. In addition, when all or part of the functions in the above embodiments are implemented by a computer program, the program may be stored in a storage medium such as a server, another computer, a magnetic disk, an optical disk, a flash disk, or a removable hard disk, and may be downloaded or copied to a memory of a local device, or may be version-updated in a system of the local device, and when the program in the memory is executed by a processor, all or part of the functions in the above embodiments may be implemented.
The present invention has been described in terms of specific examples, which are provided to aid understanding of the invention and are not intended to be limiting. For a person skilled in the art to which the invention pertains, several simple deductions, modifications or substitutions may be made according to the idea of the invention.

Claims (10)

1. A method for managing an IP core, comprising:
receiving an externally input key;
judging whether the secret key is correct or not, if so, processing the received data to be processed, and outputting a correct processing result; and if the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability.
2. The method for managing as claimed in claim 1, wherein said processing the received data to be processed to output an erroneous processing result with a predetermined probability comprises:
judging whether the received data to be processed belongs to preset special data or not, if so, processing the data to be processed, and outputting an error processing result; otherwise, processing the data to be processed and outputting a correct processing result; the occupation ratio of the special data in all possible data to be processed is the preset probability.
3. The management method according to claim 1 or 2, characterized in that said preset probability does not exceed 1%.
4. The method of managing of claim 1, wherein the determining whether the key is correct comprises:
judging whether the secret key belongs to a preset secret key set or not, if so, determining that the secret key is correct, and otherwise, determining that the secret key is incorrect; the set of keys includes a plurality of correct keys.
5. An IP core, comprising:
the key verification module is used for receiving an externally input key and judging whether the key is correct or not;
the data processing module is used for processing the received data to be processed when the secret key is correct and outputting a correct processing result; and when the secret key is incorrect, processing the received data to be processed, and outputting an incorrect processing result according to a preset probability.
6. The IP core according to claim 5, wherein the data processing module processes the received data to be processed, and outputs an erroneous processing result with a predetermined probability, and the processing result includes:
judging whether the received data to be processed belongs to preset special data or not, if so, processing the data to be processed, and outputting an error processing result; otherwise, processing the data to be processed and outputting a correct processing result; the occupation ratio of the special data in all possible data to be processed is the preset probability.
7. The IP core of claim 5 or 6, wherein the predetermined probability does not exceed 1%.
8. The IP core of claim 5, wherein the key verification module to determine whether the key is correct comprises:
judging whether the secret key belongs to a preset secret key set or not, if so, determining that the secret key is correct, and otherwise, determining that the secret key is incorrect; the set of keys includes a plurality of correct keys.
9. A chip, characterized in that part of the circuitry of the chip is fabricated according to the IP core of any of claims 5-8.
10. A computer-readable storage medium, characterized in that the medium has stored thereon a program which is executable by a processor to implement the method of any one of claims 1 to 4.
CN202110357723.7A 2021-04-01 2021-04-01 IP core, IP core management method and chip Active CN113032791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110357723.7A CN113032791B (en) 2021-04-01 2021-04-01 IP core, IP core management method and chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110357723.7A CN113032791B (en) 2021-04-01 2021-04-01 IP core, IP core management method and chip

Publications (2)

Publication Number Publication Date
CN113032791A true CN113032791A (en) 2021-06-25
CN113032791B CN113032791B (en) 2024-05-31

Family

ID=76454442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110357723.7A Active CN113032791B (en) 2021-04-01 2021-04-01 IP core, IP core management method and chip

Country Status (1)

Country Link
CN (1) CN113032791B (en)

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1806410A (en) * 2003-06-12 2006-07-19 松下电器产业株式会社 Encryption communication system
CN102460404A (en) * 2009-06-01 2012-05-16 起元技术有限责任公司 Generating obfuscated data
CN104809405A (en) * 2015-04-24 2015-07-29 广东电网有限责任公司信息中心 Structural data asset leakage prevention method based on hierarchical classification
US20160239650A1 (en) * 2015-02-15 2016-08-18 Alibaba Group Holding Limited System and method for user identity verification, and client and server by use thereof
CN105912576A (en) * 2016-03-31 2016-08-31 北京外国语大学 Emotion classification method and emotion classification system
CN106027529A (en) * 2016-05-25 2016-10-12 华中科技大学 Intrusion detection system and method based on traceability information
CN106155904A (en) * 2016-06-30 2016-11-23 浪潮(北京)电子信息产业有限公司 A kind of direct fault location instrument collocation method and device
CN106919857A (en) * 2015-12-28 2017-07-04 上海新微技术研发中心有限公司 Chip, and starting protection device and method of chip
CN107104794A (en) * 2017-04-25 2017-08-29 深圳市博巨兴实业发展有限公司 One kind is used for low-power consumption key management module in SOC
CN108055120A (en) * 2017-12-27 2018-05-18 东华大学 A kind of method for detecting AES-OTR algorithms and resisting differential fault attack
CN108647525A (en) * 2018-05-09 2018-10-12 西安电子科技大学 The secret protection single layer perceptron batch training method that can verify that
CN108900300A (en) * 2018-06-20 2018-11-27 北京邮电大学 A kind of efficient error verification and private key amplification method in continuous variable quantum key distribution
CN109194656A (en) * 2018-09-10 2019-01-11 国家电网有限公司 A kind of method of distribution wireless terminal secure accessing
US20190026638A1 (en) * 2017-07-24 2019-01-24 Boe Technology Group Co., Ltd. Knowledge verification method, knowledge verification device and storage medium
CN109376376A (en) * 2018-09-04 2019-02-22 南京航空航天大学 A logic encryption hardware security protection method based on key gate insertion algorithm
CN109787743A (en) * 2019-01-17 2019-05-21 广西大学 A kind of full homomorphic cryptography method that can verify that based on matrix operation
CN110363031A (en) * 2018-03-26 2019-10-22 北京华大信安科技有限公司 A kind of IP kernel authorization method, device and PLD
CN110601846A (en) * 2019-08-30 2019-12-20 苏州浪潮智能科技有限公司 System and method for verifying virtual trusted root
CN110633583A (en) * 2019-09-02 2019-12-31 卓尔智联(武汉)研究院有限公司 Integrated circuit chip, integrated circuit and electronic device
CN110807177A (en) * 2019-11-06 2020-02-18 南京法艾博光电科技有限公司 Reverse engineering defense device and method
CN110851846A (en) * 2019-10-18 2020-02-28 天津大学 Logic encryption method based on circuit key nodes
CN111125789A (en) * 2019-12-03 2020-05-08 宁波大学 A chip key management method with multiple hardware IP cores
CN111464286A (en) * 2019-01-22 2020-07-28 北京大学 A logic encryption defense method based on key gate location selection
CN112257093A (en) * 2020-11-09 2021-01-22 天冕信息技术(深圳)有限公司 Authentication method of data object, terminal and storage medium
CN112532392A (en) * 2020-11-16 2021-03-19 中信银行股份有限公司 Key processing method, device, equipment and storage medium
CN112564885A (en) * 2020-11-26 2021-03-26 南京农业大学 Side channel attack method based on mask variable maximum probability density function distribution

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1806410A (en) * 2003-06-12 2006-07-19 松下电器产业株式会社 Encryption communication system
CN102460404A (en) * 2009-06-01 2012-05-16 起元技术有限责任公司 Generating obfuscated data
US20160239650A1 (en) * 2015-02-15 2016-08-18 Alibaba Group Holding Limited System and method for user identity verification, and client and server by use thereof
CN104809405A (en) * 2015-04-24 2015-07-29 广东电网有限责任公司信息中心 Structural data asset leakage prevention method based on hierarchical classification
CN106919857A (en) * 2015-12-28 2017-07-04 上海新微技术研发中心有限公司 Chip, and starting protection device and method of chip
CN105912576A (en) * 2016-03-31 2016-08-31 北京外国语大学 Emotion classification method and emotion classification system
CN106027529A (en) * 2016-05-25 2016-10-12 华中科技大学 Intrusion detection system and method based on traceability information
CN106155904A (en) * 2016-06-30 2016-11-23 浪潮(北京)电子信息产业有限公司 A kind of direct fault location instrument collocation method and device
CN107104794A (en) * 2017-04-25 2017-08-29 深圳市博巨兴实业发展有限公司 One kind is used for low-power consumption key management module in SOC
US20190026638A1 (en) * 2017-07-24 2019-01-24 Boe Technology Group Co., Ltd. Knowledge verification method, knowledge verification device and storage medium
CN108055120A (en) * 2017-12-27 2018-05-18 东华大学 A kind of method for detecting AES-OTR algorithms and resisting differential fault attack
CN110363031A (en) * 2018-03-26 2019-10-22 北京华大信安科技有限公司 A kind of IP kernel authorization method, device and PLD
CN108647525A (en) * 2018-05-09 2018-10-12 西安电子科技大学 The secret protection single layer perceptron batch training method that can verify that
CN108900300A (en) * 2018-06-20 2018-11-27 北京邮电大学 A kind of efficient error verification and private key amplification method in continuous variable quantum key distribution
CN109376376A (en) * 2018-09-04 2019-02-22 南京航空航天大学 A logic encryption hardware security protection method based on key gate insertion algorithm
CN109194656A (en) * 2018-09-10 2019-01-11 国家电网有限公司 A kind of method of distribution wireless terminal secure accessing
CN109787743A (en) * 2019-01-17 2019-05-21 广西大学 A kind of full homomorphic cryptography method that can verify that based on matrix operation
CN111464286A (en) * 2019-01-22 2020-07-28 北京大学 A logic encryption defense method based on key gate location selection
CN110601846A (en) * 2019-08-30 2019-12-20 苏州浪潮智能科技有限公司 System and method for verifying virtual trusted root
CN110633583A (en) * 2019-09-02 2019-12-31 卓尔智联(武汉)研究院有限公司 Integrated circuit chip, integrated circuit and electronic device
CN110851846A (en) * 2019-10-18 2020-02-28 天津大学 Logic encryption method based on circuit key nodes
CN110807177A (en) * 2019-11-06 2020-02-18 南京法艾博光电科技有限公司 Reverse engineering defense device and method
CN111125789A (en) * 2019-12-03 2020-05-08 宁波大学 A chip key management method with multiple hardware IP cores
CN112257093A (en) * 2020-11-09 2021-01-22 天冕信息技术(深圳)有限公司 Authentication method of data object, terminal and storage medium
CN112532392A (en) * 2020-11-16 2021-03-19 中信银行股份有限公司 Key processing method, device, equipment and storage medium
CN112564885A (en) * 2020-11-26 2021-03-26 南京农业大学 Side channel attack method based on mask variable maximum probability density function distribution

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
ANTONIS MICHALAS等: "Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments", 《2020 IEEE 20TH MEDITERRANEAN ELECTROTECHNICAL CONFERENCE ( MELECON)》, 15 July 2020 (2020-07-15), pages 141 - 146 *
MINGCHANG LIU等: "LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach", 《2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST)》, 18 August 2022 (2022-08-18), pages 1 - 10, XP034171767, DOI: 10.1109/PST55820.2022.9851969 *
戴计生等: "嵌入式控制软件保密性设计研究与应用", 《机车电传动》, no. 05, 10 September 2018 (2018-09-10), pages 56 - 60 *
李海娥等: "基于路径延时匹配的硬件IP核知识产权保护方法", 《电子产品世界》, vol. 21, no. 12, 4 December 2014 (2014-12-04), pages 30 - 31 *
盛家伦等: "一种基于人脸识别的WLAN安全通信系统的设计与实现", 《信息网络安全》, no. 09, 10 September 2013 (2013-09-10), pages 68 - 72 *
龙翔浅帝: "Linux系统如何统计暴力破解密码次数及防御措施", Retrieved from the Internet <URL:https://www.jianshu.com/p/9c12b98c3650> *

Also Published As

Publication number Publication date
CN113032791B (en) 2024-05-31

Similar Documents

Publication Publication Date Title
Liao et al. Soliaudit: Smart contract vulnerability assessment based on machine learning and fuzz testing
Sirone et al. Functional analysis attacks on logic locking
CN102542191B (en) RTL (register transfer level) IP (intellectual property) core protecting method
US8844049B2 (en) Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer
Rathor et al. IP core steganography using switch based key-driven hash-chaining and encoding for securing DSP kernels used in CE systems
US10628615B2 (en) Asset protection of integrated circuits during transport
CN101458946B (en) Information processing device, disc, information processing method, and program
US6889326B1 (en) Watermarking based protection of virtual component blocks
Anandakumar et al. Rethinking watermark: Providing proof of IP ownership in modern SoCs
CN101625674B (en) Microprocessor with special module register and access protection method
TWI825522B (en) Method and secure boot control circuit for controlling secure boot of electronic device and method for controlling enrollment of electronic device
Rathor et al. Hard-sign: A hardware watermarking scheme using dated handwritten signature
US5751595A (en) Method for building and verifying authenticity of a rule system
CN109376376B (en) Logic encryption type hardware security protection method based on key gate insertion algorithm
US9660802B1 (en) Systems and methods for generating and storing silicon fingerprints for a security chip
Chaurasia et al. Fault Secured JPEG-Codec Hardware Accelerator with Piracy Detective Control Using Secure Fingerprint Template
CN113032791B (en) IP core, IP core management method and chip
CN112685698A (en) Software authorization method and system based on USB Key
Sengupta et al. Exploring unified biometrics with encoded dictionary for hardware security of fault secured IP core designs
Sengupta et al. Securing Fault-Detectable CNN Hardware Accelerator against False Claim of IP Ownership Using Embedded Fingerprint as Countermeasure
Rathor et al. Signature biometric based authentication of IP cores for secure electronic systems
Biswas Using pattern of on-off routers and links and router delays to protect network-on-chip intellectual property
Sengupta et al. A Survey of High Level Synthesis based Hardware (IP) Watermarking Approaches
TWI756631B (en) Computer system having firmware verification mechanism and firmware verification method of the same
CN116719977B (en) Sequence number writing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant