ROM combines storage island encryption technology with Taisilicon MCU chip security protection solution

Publisher:灵感驿站Latest update time:2021-11-19 Source: 爱集微Keywords:ROM Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

At present, the industry generally uses read-only memory images (ROMs) with dynamic passwords (OTPs) to develop some boot upgrade code logics with high security requirements.

This solution will be burned in once during tape-out, which can prevent users from making changes to the MCU's startup upgrade logic, thereby hiding some security checks or upgrade interaction logic implementations from the source, and protecting the MCU chip program from malicious tampering and upgrades.

However, the MCU chip prepared by this method can only be burned once in its entire life cycle. In the actual chip development process, it is almost impossible for developers to consider all the requirements of the chip at one time. Often, as the chip is mass-produced and applied, it needs to be gradually upgraded.

When the original burned code logic has been solidified, the MCU chip content cannot be modified or further upgraded, and the solidified code logic has been fixed, and there is also a risk of leakage. For this reason, Taishi Micro applied for an invention patent on June 30, 2020, entitled "A method for achieving MCU chip security using ROM combined with storage islands" (application number: 202010606503.9), and the applicant is Shanghai Taishi Microelectronics Co., Ltd.

Based on the relevant information currently disclosed by the patent, let us take a look at this technical solution.

As shown in the figure above, it is a logical flow chart of the method for realizing MCU chip security by combining traditional ROM with storage island invented in the patent. The MCU module mainly includes storage island unit and ROM boot unit. First, it is necessary to write a security program into the system and encrypt the security program with a private key. Secondly, the storage island unit stores the security program encrypted with the private key.

Afterwards, the ROM boot unit responds to the external boot signal and pairs the public key with the security program encrypted by the private key. If the pairing is successful, the ROM boot unit reads the security program and then starts up. If the pairing is unsuccessful, the ROM boot unit cannot read the security program and cannot start up.

In the above system module, by setting up a storage island unit in the MCU module, the content of the storage island unit can be recorded, upgraded and replaced by the burning module, which solves the defect that the traditional ROM cannot be expanded twice. In addition, the content transmitted to the storage island unit by the burning module is encrypted by RSA asymmetric encryption.

The system mainly uses the cloud service module to encrypt the content with a private key. After it is passed to the storage island unit, the encrypted content can only be decrypted by the user using the correct public key. After decryption, the ROM boot unit can read the content in the storage island unit, and then the MCU chip can start normally. This can prevent illegal elements from stealing or cracking the program, and eliminate the breeding of such illegal activities from the root.

Next, let's take a look at the schematic diagram of the cloud service module. As shown in the figure above, the cloud service module is used to store the private key, and the cloud service module uses the private key to encrypt the security program to form a ciphertext.

The user compiles plain text through the IDE on the PC, and then passes the plain text to the cloud server. The cloud server selects different secret keys based on the specific chip, and then uses the secret keys to encrypt the plain text to form ciphertext.

After that, the ciphertext will be passed to the burning module without passing the secret key. The cloud service module can manage the secret key. As long as the secret key is not leaked, even if the criminals get the public key, they cannot crack the ciphertext, and the cracking program cannot run normally, which further protects the rights and interests of software developers.

The above is the solution invented by Taishiwei that uses ROM combined with storage islands to achieve MCU chip security. This solution uses encryption technology and cloud storage technology. Only by decrypting the ROM startup unit can the content in the storage island unit be read, and then the MCU chip can be started normally, thereby preventing illegal elements from stealing or cracking the program.


Keywords:ROM Reference address:ROM combines storage island encryption technology with Taisilicon MCU chip security protection solution

Previous article:U.S. industrial production resumed in October, is the chip shortage about to end?
Next article:Hangjin Technology: The company's main GPU has achieved large-scale sales

Recommended ReadingLatest update time:2024-11-15 10:55

Solution to the Flash Memory Read-out protection problem when programming stm8 in IAR
The stm8 minimum board I just bought can't burn programs, but it worked fine when burning programs on the previous boards. The Flash Memory Read-out protection error occurs during programming. Without further ado: To remove the write protection, first use the stvp tool and click to open the link After opening the stv
[Microcontroller]
Solution to the Flash Memory Read-out protection problem when programming stm8 in IAR
Memory issues in labview
I have been learning to use LabVIEW for nearly 2 years. Since I have always been writing relatively small data acquisition programs, I have never considered the problem of data memory. Recently, I am writing a program that uses a lot of internal tools and uses a word report template to generate the final test report. I
[Test Measurement]
Analysis of memory copy process when s3c2440 starts
Yesterday, we copied 4K data from nand-flash to sdram, and the data was copied from steppingstone to sdram for execution; today, we will copy the data after 4K on nand-flash, so the focus is on the control of nand-flash and sdram.   Let’s talk about the tq2440 development board first. When the boot jumper of the dev
[Microcontroller]
Analysis of memory copy process when s3c2440 starts
C51 Two methods of writing data to memory space addresses
method one: unsigned char volatile xdata CH375_CMD_PORT _at_ 0xBDF1; /* I/O address of CH375 command port */ CH375_CMD_PORT = Data;   Method Two: *((unsigned char xdata *) 0xBDF1) = Data;   Similar: DSP2407 header file voatile unsigned int * IMR = (volatile unsigned int *)0x0004;   *IMR = value;  
[Microcontroller]
s3c2440 bare metal-memory controller (2. Connection of different bit width peripherals and CPU address bus)
Connection of devices with different bit widths Let's first take a look at how the peripheral ROM is connected to the CPU address bus in the 2440 chip manual. Connection between 8bit rom and CPU address line Connection between 8bit*2 rom and CPU address line Connection between 8bit*4 rom and CPU address line Con
[Microcontroller]
s3c2440 bare metal-memory controller (2. Connection of different bit width peripherals and CPU address bus)
DigiKey announces global partnership with Kingston Technology, one of the leaders in memory and storage solutions
DigiKey Announces Global Partnership with Kingston Technology, a Leader in Memory and Storage Solutions DigiKey, a global distributor of electronic components and automation products with full stock and fast delivery, today announced a partnership with Kingston Technology to distribute its memory prod
[Embedded]
DigiKey announces global partnership with Kingston Technology, one of the leaders in memory and storage solutions
As stable as double-knotted shoelaces, tiny magnetic vortices may become next-generation memory materials
Magnetic fields generated by skyrmions in a two-dimensional sheet of material composed of iron, germanium and tellurium. Image source: Argonne National Laboratory, USA Magnets store data in computers. Using the direction of the magnetic field, each tiny bar magnet can store a bit of memory as a zero or a one. Res
[Semiconductor design/manufacturing]
As stable as double-knotted shoelaces, tiny magnetic vortices may become next-generation memory materials
What is the difference between register, memory, RAM, and ROM?
These are relatively abstract professional terms, especially registers. Many people are confused about this when they are learning microcontrollers. What exactly are registers? In fact, you don’t need to have a deep understanding of what it is. You only need to know the value of the configuration register to use the p
[Microcontroller]
Latest Mobile phone portable Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号