Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chip identification method

A chip identification, chip technology, applied in the field of chip identification, can solve problems such as product security threats

Pending Publication Date: 2019-01-18
SHANGHAI INTEGRATED CIRCUIT RES & DEV CENT +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This poses a great threat to the security of the product itself.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip identification method
  • Chip identification method
  • Chip identification method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0059] The first is step S201, the first identifier is obtained according to the specific film layer of the chip, and the second identifier is obtained to form a chip identifier.

[0060] The chip identifier includes an identifier set by a user (second identifier), an identifier set by a manufacturer (first identifier), other user-defined identifiers or identifiers in any combination thereof. In this embodiment, a combination of user-set identifiers and manufacturer-set identifiers is used, such as Figure 4 Reference numerals 301 and 302 show. Using this method, as long as the identifiers set by the user and the identifiers set by the manufacturer are well protected, even a researcher who knows all the design details cannot crack the above-mentioned chip identifiers without any value, nor can the blank The chip, rewritten as a chip with a specific chip identifier, is more secure than a single manufacturer code or user code.

[0061] Next is step S202, using the secure hash ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for identifying a chip includes obtaining a chip identifier, wherein that chip identifier comprises at least a first identify and a second identifier arranged in a predetermined order; the chip identifier is encrypted by MD6 to obtain the chip identifier encrypted by MD6; writing the chip identifier encrypted by MD6 into the set address in the OTP register of the chip; obtaining data froman OTP register when data is to be read from a set address of the OTP register; the obtained data is encrypted by MD6 to obtain the read data encrypted by MD6; the read data encrypted by MD6 is provided. The chip identification method provided by the invention realizes that the OTP register can obtain the unique chip identifier by making the chip identifier contain at least the first identifier and the second identifier, and the first identifier is obtained according to the logical value of the chip-specific film layer pattern, and is difficult to be reverse-decoded and illegally copied.

Description

technical field [0001] The invention relates to the technical field of semiconductors, in particular to a chip identification method. Background technique [0002] As embedded applications become more and more widespread, the security of chip products is becoming more and more important. On the one hand, it is to protect the hardware design, and on the other hand, it is also for the safety of the product itself to prevent hacking (HACKED). In order to protect the data in the chip, more and more manufacturers provide a special register in the chip: OTP register (OneTime Programmable, one-time programming register). The OTP register is a one-time write for each bit of information, it cannot be rewritten, and the data will not be lost when the power is turned off, and the data can be read out repeatedly. [0003] Chip identifiers, also known as Device Unique Keys, are the core technology of chip security and cannot be decrypted or reused. The creation and storage of Direct E...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K1/12G06K7/00G06K19/073
CPCG06K1/128G06K7/0008G06K19/07309
Inventor 李林曾严张远陈西昌温建新李铭
Owner SHANGHAI INTEGRATED CIRCUIT RES & DEV CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products