A jtag circuit with a protection module

A technology for protecting modules and circuits, applied in internal/peripheral computer component protection, digital data authentication, etc., can solve problems such as chip attacks, and achieve the effects of preventing attacks, reducing hardware costs, and preventing control

Active Publication Date: 2017-04-12
BEIJING MXTRONICS CORP +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] While providing testing and debugging convenience, because of the characteristics of JTAG itself, illegal users can attack the chip through the JTAG circuit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A jtag circuit with a protection module
  • A jtag circuit with a protection module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Such as figure 1 Shown is the composition block diagram of JTAG circuit of the present invention, can know that the JTAG circuit that the present invention has protection module comprises TAP controller, instruction register, instruction decoder, protection module, BYPASS register, device ID register, boundary scan register, TDO circuit, and TDI port, TMS port, TCK port and TDO port, where:

[0043] The TDI port, the TMS port, and the TCK port are the input ports of the JTAG circuit, and the TDO port is the output port of the JTAG circuit;

[0044] The TAP controller generates a state transition control signal according to the mode selection data input by the TMS port and the clock signal input by the TCK port, and sends the state transition control signal to the instruction decoder, the protection module, the BYPASS register, the device ID register, and the boundary scan register;

[0045] The instruction register receives the serial instruction data input through th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A JTAG circuit with a protection module comprises a TAP controller, an instruction register, an instruction encoder, the protection module, a BYPASS register, a device ID register, a boundary scanning register, a TDO circuit, an input port and an output port, and is characterized in that a locking instruction and an unlocking instruction are added on the basis of the IEEE 1149.1 standard; the locking and unlocking of the JTAG circuit are controlled in a code identification manner to prevent an illegal user from controlling the JTAG circuit, effectively improve the safety of the JTAG circuit, and prevent the outside to attack a chip system through the JTAG circuit. The JTAG circuit can be completely compatible with the IEEE 1149.1 standard, and is low in hardware cost.

Description

technical field [0001] The invention relates to the field of integrated circuits, in particular to a JTAG circuit with a protection module, which is suitable for all chips applying the IEEE 1149.1 standard. Background technique [0002] The JTAG circuit, that is, the boundary scan circuit, is basically implemented on the basis of the IEEE 1149.1 standard, and some circuits based on IEEE 1149.4, IEEE 1149.5, IEEE 1149.6, IEEE 1532 and other standards are also based on the IEEE1149.1 standard. The JTAG circuit based on the IEEE 1149.1 standard is widely used in testing and debugging at the device level, board level and system level. [0003] While providing testing and debugging convenience, because of the characteristics of JTAG itself, illegal users can attack the chip through the JTAG circuit. One of the scenarios is to execute the INTEST instruction after obtaining the control of the JTAG pin, and monitor the output results through all possible input variables to deduce t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/76
Inventor 文治平邓先坤李学武陈雷赵元富张彦龙林彦君王浩驰方新嘉张帆
Owner BEIJING MXTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products