At present, the industry generally uses read-only memory images (ROMs) with dynamic passwords (OTPs) to develop some boot upgrade code logics with high security requirements.
This solution will be burned in once during tape-out, which can prevent users from making changes to the MCU's startup upgrade logic, thereby hiding some security checks or upgrade interaction logic implementations from the source, and protecting the MCU chip program from malicious tampering and upgrades.
However, the MCU chip prepared by this method can only be burned once in its entire life cycle. In the actual chip development process, it is almost impossible for developers to consider all the requirements of the chip at one time. Often, as the chip is mass-produced and applied, it needs to be gradually upgraded.
When the original burned code logic has been solidified, the MCU chip content cannot be modified or further upgraded, and the solidified code logic has been fixed, and there is also a risk of leakage. For this reason, Taishi Micro applied for an invention patent on June 30, 2020, entitled "A method for achieving MCU chip security using ROM combined with storage islands" (application number: 202010606503.9), and the applicant is Shanghai Taishi Microelectronics Co., Ltd.
Based on the relevant information currently disclosed by the patent, let us take a look at this technical solution.
As shown in the figure above, it is a logical flow chart of the method for realizing MCU chip security by combining traditional ROM with storage island invented in the patent. The MCU module mainly includes storage island unit and ROM boot unit. First, it is necessary to write a security program into the system and encrypt the security program with a private key. Secondly, the storage island unit stores the security program encrypted with the private key.
Afterwards, the ROM boot unit responds to the external boot signal and pairs the public key with the security program encrypted by the private key. If the pairing is successful, the ROM boot unit reads the security program and then starts up. If the pairing is unsuccessful, the ROM boot unit cannot read the security program and cannot start up.
In the above system module, by setting up a storage island unit in the MCU module, the content of the storage island unit can be recorded, upgraded and replaced by the burning module, which solves the defect that the traditional ROM cannot be expanded twice. In addition, the content transmitted to the storage island unit by the burning module is encrypted by RSA asymmetric encryption.
The system mainly uses the cloud service module to encrypt the content with a private key. After it is passed to the storage island unit, the encrypted content can only be decrypted by the user using the correct public key. After decryption, the ROM boot unit can read the content in the storage island unit, and then the MCU chip can start normally. This can prevent illegal elements from stealing or cracking the program, and eliminate the breeding of such illegal activities from the root.
Next, let's take a look at the schematic diagram of the cloud service module. As shown in the figure above, the cloud service module is used to store the private key, and the cloud service module uses the private key to encrypt the security program to form a ciphertext.
The user compiles plain text through the IDE on the PC, and then passes the plain text to the cloud server. The cloud server selects different secret keys based on the specific chip, and then uses the secret keys to encrypt the plain text to form ciphertext.
After that, the ciphertext will be passed to the burning module without passing the secret key. The cloud service module can manage the secret key. As long as the secret key is not leaked, even if the criminals get the public key, they cannot crack the ciphertext, and the cracking program cannot run normally, which further protects the rights and interests of software developers.
The above is the solution invented by Taishiwei that uses ROM combined with storage islands to achieve MCU chip security. This solution uses encryption technology and cloud storage technology. Only by decrypting the ROM startup unit can the content in the storage island unit be read, and then the MCU chip can be started normally, thereby preventing illegal elements from stealing or cracking the program.
Previous article:U.S. industrial production resumed in October, is the chip shortage about to end?
Next article:Hangjin Technology: The company's main GPU has achieved large-scale sales
Recommended ReadingLatest update time:2024-11-15 10:55
- Popular Resources
- Popular amplifiers
- Apple and Samsung reportedly failed to develop ultra-thin high-density batteries, iPhone 17 Air and Galaxy S25 Slim phones became thicker
- Micron will appear at the 2024 CIIE, continue to deepen its presence in the Chinese market and lead sustainable development
- Qorvo: Innovative technologies lead the next generation of mobile industry
- BOE exclusively supplies Nubia and Red Magic flagship new products with a new generation of under-screen display technology, leading the industry into the era of true full-screen
- OPPO and Hong Kong Polytechnic University renew cooperation to upgrade innovation research center and expand new boundaries of AI imaging
- Gurman: Vision Pro will upgrade the chip, Apple is also considering launching glasses connected to the iPhone
- OnePlus 13 officially released: the first flagship of the new decade is "Super Pro in every aspect"
- Goodix Technology helps iQOO 13 create a new flagship experience for e-sports performance
- BOE's new generation of light-emitting devices empowers iQOO 13 to fully lead the flexible display industry to a new level of performance
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- ASML predicts that its revenue in 2030 will exceed 457 billion yuan! Gross profit margin 56-60%
- Detailed explanation of intelligent car body perception system
- How to solve the problem that the servo drive is not enabled
- Why does the servo drive not power on?
- What point should I connect to when the servo is turned on?
- How to turn on the internal enable of Panasonic servo drive?
- What is the rigidity setting of Panasonic servo drive?
- How to change the inertia ratio of Panasonic servo drive
- What is the inertia ratio of the servo motor?
- Is it better for the motor to have a large or small moment of inertia?
- Regarding the frequency of use of capacitors
- How to learn FPGA technology?
- Please help me
- [Mil MYD-YA15XC-T Review] + Kernel Compilation
- "Playing with the Board" + Replaying MicroPython on the STM32F7DISC (3)
- Make Magazine: The Rise of Python and the Microcontroller of the Year
- 【GD32450I-EVAL】+ 05FreeRTOS porting and task creation
- stm32 got stuck halfway through downloading
- [Zero-knowledge ESP8266 tutorial] Quick start 27 Use of ADXL345 sensor module
- How to perform OTA upgrade on the OKT507-C development board on the Android system