Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure chip burning method and system

A programming method and technology for a programming system, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as increasing management and operation costs, avoid open network transmission, solve leakage problems, and achieve high security. sexual effect

Inactive Publication Date: 2022-05-13
嘉兴威伏半导体有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of the above methods are obvious. First, it is necessary to build a security server and a dedicated security communication network for secure transmission of encrypted files; second, a dedicated security terminal is required to decrypt and then upload the test program to the security server; third, every A test machine needs to send a request to the server to obtain the decrypted key data and download it to the chip under test; fourth, information security and confidentiality need to run through the entire generation, transmission, and download processes, and it is necessary to strictly ensure that the key data and product information control, undoubtedly increases the cost of management operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure chip burning method and system
  • Secure chip burning method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] Such as figure 1 A safe chip programming method is shown, the method specifically includes the following steps: verifying the testing machine; reading the unique information data of the tested chip; performing the unique information data of the tested chip according to a preset encryption algorithm Encrypt calculation to obtain the exclusive digital certificate corresponding to the tested chip; burn the exclusive digital certificate to the tested chip through the testing machine.

[0036] Through the above method, the programming content is obtained by reading the unique information data of the chip under test and then calculated with an encryption algorithm, which shortens the transmission link of the programming content of the chip under test, and the entire data transmission is completely carried out in the hardware security environment, avoiding cross The open network transmission of the hardware solves the leaking problem caused by the separate distribution of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure chip burning method and system. The invention discloses a secure chip burning method. The method specifically comprises the following steps: checking a test machine; reading unique information data of the tested chip; performing encryption calculation on the unique information data of the tested chip according to a preset encryption algorithm to obtain an exclusive digital certificate corresponding to the tested chip; and burning the exclusive digital certificate on the tested chip through the test machine. According to the method, the transmission link of the burnt content of the tested chip is shortened, the burnt content is obtained through calculation by an encryption algorithm after the unique information data of the tested chip is read, the whole data transmission is completely carried out in a hardware security environment, cross-hardware public network transmission is avoided, and the transmission efficiency is improved. The problem of leakage caused by separate distribution of the burnt content and the tested chip in the prior art is solved, and the method has high safety and high convenience and is suitable for batch production operation.

Description

technical field [0001] The invention relates to a chip programming method and system, in particular to a safe chip programming method and system, and belongs to the technical field of chip manufacturing. Background technique [0002] With social development and technological progress, the market demand for security chips continues to increase, expanding from the previous national defense security to many civilian markets. Many chips have security certification requirements, and keys need to be burned in the chip. However, the production of today's chips is basically carried out in the form of outsourcing, which means that the key needs to be distributed to the outsourcing factory through a secure channel, and then the chip is encrypted and burned through the test machine in the factory. This process involves many links, and security, convenience, and batch performance all face great challenges. [0003] In the prior art, key burning during the production and testing process...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/61G06F21/60H04L9/08H04L9/32
CPCG06F8/63G06F21/602H04L9/0863H04L9/3263
Inventor 宁建宇徐四九
Owner 嘉兴威伏半导体有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products