WO2022141731A1 - 基于usb协议的usb设备ip侵权识别方法及其终端 - Google Patents
基于usb协议的usb设备ip侵权识别方法及其终端 Download PDFInfo
- Publication number
- WO2022141731A1 WO2022141731A1 PCT/CN2021/074379 CN2021074379W WO2022141731A1 WO 2022141731 A1 WO2022141731 A1 WO 2022141731A1 CN 2021074379 W CN2021074379 W CN 2021074379W WO 2022141731 A1 WO2022141731 A1 WO 2022141731A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- usb
- infringement
- protocol
- infringement identification
- lfps
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000012360 testing method Methods 0.000 claims description 19
- 238000012546 transfer Methods 0.000 claims description 8
- 238000013461 design Methods 0.000 description 14
- 239000007787 solid Substances 0.000 description 5
- 230000006870 function Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000007812 deficiency Effects 0.000 description 1
- 238000012938 design process Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/42—Bus transfer protocol, e.g. handshake; Synchronisation
- G06F13/4282—Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2213/00—Indexing scheme relating to interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F2213/0042—Universal serial bus [USB]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Definitions
- the invention relates to the technical field of USB, in particular to a USB device IP infringement identification method based on the USB protocol and a terminal thereof.
- the corresponding customers are chip manufacturers.
- If the pay-per-tape method is adopted there is a possibility that the chip manufacturer pays the one-time tape-out fee for the IP.
- the chip manufacturer takes multiple tape-outs for different products.
- the integrated circuit module can be divided into three types: soft core, solid core and hard core.
- Soft IP In the process of logic IC design, the IC designer will use the hardware description language to write the functions required by the system out of the register transfer level (RTL, Register Transfer Level) after the system specification is completed. program, this RTL file is called a soft core.
- the soft core is provided in the form of source code, so it has high flexibility and can be modified by the user to realize the required circuit system design, and has nothing to do with the specific implementation process.
- the disadvantage of soft core is that independent intellectual property rights are not easily protected, especially for standard protocol IP (such as USB3.0), even if the code is encrypted, the encrypted code of the same IP can still be used repeatedly in different SOC projects middle.
- the netlist file is the so-called solid core.
- the solid core is a compromise between the soft core and the hard core. Compared with the soft core, it has higher reliability and higher flexibility than the hard core, but the solid core still cannot meet the needs of customers like the soft core. Make logical modifications.
- Hard IP Hard IP
- the netlist file After the netlist file is verified, enter the step of physical design, first perform the location configuration design (Floor Planning) of the functional block, and then perform the layout and routing design (Place&Routing), and complete the physical layout.
- the GDSII file generated after wiring is the hard core.
- the process has been completed and cannot be modified.
- the hard core obtained by the user is only the product function rather than the product design. Therefore, the design and manufacturer of the hard core exercise full control over it.
- the hard core is Intellectual property protection is also relatively simple.
- USB device is a widely used standard IP, and taking effective measures to protect its intellectual property has become a research direction that needs to be expanded urgently in the industry, but the current technology has not been able to solve this technical problem.
- the purpose of the present invention is to provide a USB device IP infringement identification method and a terminal thereof based on the USB protocol.
- the USB device IP infringement identification method based on the USB protocol based on the USB protocol is characterized in that, comprising the following steps:
- the USB host to be tested enters the Compliance mode
- the infringement identification device sends the X.LFPS file to the USB host to be tested;
- USB host under test After the USB host under test receives the X.LFPS file, the USB host under test sends IP copyright information to the infringement identification device;
- a USB protocol analyzer is connected between the USB host to be tested and the infringement identification device.
- step S3 the X.LFPS file cannot be repeated with the LFPS in the USB protocol.
- the USB protocol analyzer determines IP copyright information by grabbing the IP copyright information sent by the USB host under test.
- the USB protocol based on it is a protocol above USB3.0, including the USB3.0 protocol.
- the USB device IP infringement identification terminal based on the USB protocol based on the USB protocol is characterized in that it includes an infringement identification device and a USB protocol analyzer.
- the host sends the X.LFPS file; the USB protocol analyzer is used to transfer the X.LFPS file sent by the infringement identification device, transfer the IP copyright information sent by the USB host to be tested, and capture and judge with the IP copyright information.
- the present invention is simple in structure, convenient in operation, and easy to implement; using the compliance mode specified by the USB protocol for infringement identification is more stable and reliable, and can save costs; the present invention provides an infringement identification method, and the infringement identification method is more efficient It is flexible and the identification method is more concealed; the present invention can not only identify IP infringement, but also identify product made with the IP infringement.
- Fig. 1 is the state machine described in the standard protocol that the present invention follows;
- Fig. 2 is the standard sequence supported by compliance defined in the USB standard protocol that the present invention follows;
- Fig. 3 is the composition introduction about the signal of LFPS in the USB standard protocol that the present invention follows;
- Fig. 4 is the sequence requirement of several LFPS used in the USB standard protocol that the present invention follows;
- FIG. 5 is a schematic flowchart of a USB device IP infringement identification method based on the USB protocol in an embodiment of the present invention
- FIG. 6 is a schematic flowchart of a USB device IP infringement identification method based on the USB protocol in an embodiment of the present invention
- FIG. 7 is a structural connection diagram of a USB device IP infringement identification terminal based on the USB protocol according to an embodiment of the present invention.
- the USB device has a compliance mode at the link layer, which is used for the test of the transmitter receiver.
- the USB device IP is in the Polling state.
- the USB device enters the compliance mode, and then sends Ping.LFPS to the opposite end.
- the opposite end is a dedicated test device, and the USB device is used as the device under test at this time.
- USB device to be tested After the USB device to be tested receives Ping.LFPS, it will send a Compliance pattern.
- LFPS in the USB protocol is as follows. By designing different tBurst and tRepeat times, different LFPS can be encoded as different functions.
- the USB device IP infringement identification method based on the USB protocol based on the USB protocol is characterized in that, comprising the following steps:
- the USB host to be tested enters the Compliance mode
- the infringement identification device sends the X.LFPS file to the USB host to be tested;
- X.LFPS requires strict distinction from Ping.LFPS, and does not duplicate the existing LFPS in the USB protocol.
- USB host under test After the USB host under test receives the X.LFPS file, the USB host under test sends IP copyright information to the infringement identification device, and after the USB host under test sends IP copyright information to the infringement identification device, the USB protocol analyzer captures the USB IP copyright information sent by the host to be tested;
- the USB protocol on which the present invention is based is the protocol above USB3.0, including the USB3.0 protocol.
- the USB device IP infringement identification terminal based on the USB protocol based on the USB protocol is characterized in that it includes an infringement identification device and a USB protocol analyzer, and the infringement identification device is used to make the USB host to be tested enter the Compliance mode, and Send the X.LFPS file to the USB host under test; the USB protocol analyzer is used to transfer the X.LFPS file sent by the infringement identification device, transfer the IP copyright information sent by the USB host under test, and capture and capture the IP copyright information. judge.
- the present invention is simple in structure, convenient in operation, and easy to implement; using the compliance mode specified by the USB protocol for infringement identification is more stable and reliable, and can save costs; the present invention provides an infringement identification method, and the infringement identification method is more efficient It is flexible and the identification method is more concealed; the present invention can not only identify IP infringement, but also identify product made with the IP infringement.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
基于USB协议的基于USB协议的USB设备IP侵权识别方法,其特征在于,包括以下步骤:S1、在USB待测主机对端接入一个侵权识别设备;S2、USB待测主机进入Compliance模式;S3、侵权识别设备对USB待测主机发送X.LFPS文件;S4、在USB待测主机收到X.LFPS文件后,USB待测主机向侵权识别设备发送IP版权信息;S5、根据IP版权信息判断USB待测主机是否侵权,相比现有技术,该识别方法结构简单,操作便利,容易实现;利用USB协议规定的compliance模式做侵权识别,更加稳定可靠,还可以节省成本;提供侵权识别方法,侵权识别方式更灵活,识别方式更隐蔽;不仅能够识别IP侵权;还能够识别用该IP制成的产品侵权。
Description
本发明涉及USB技术领域,具体涉及基于USB协议的USB设备IP侵权识别方法及其终端。
作为IP设计公司,对应的客户为芯片厂商。我们将设计好的IP设计代码卖给芯片厂商,芯片厂商将我们的IP集成进他们的***,然后拿去流片,做成芯片。通常会有几种销售模式,简单说一种为一次性买断付费,一种为每次流片付费。如果采用每次流片付费的方式,就存在一种可能性,芯片厂商支付了IP的一次流片费用,因为IP没有修改的需要,芯片厂商拿去多次流片,用于不同的产品。还有一种情况,是其他公司盗用IP设计公司的设计代码,流片做成产品。以上两种情况,IP设计公司的合法权益收到侵犯,必许针对不同的IP有相应侵权识别方法来应对。
从设计流程进行区分,可将集成电路模块(IP)分为软核、固核、硬核三种类型。关于软核(Soft IP):在逻辑IC设计的过程中,IC设计者会在***规格制定完成后,使用硬件描述语言将***所需的功能写出寄存器传输级(RTL,Register Transfer Level)的程序,这个RTL文件就被称为软核。软核以源代码的形式提供,故具有较高的灵活性,可经用户修改以实现所需要的电路***设计,且与具体的实现工艺无关。但软核的缺点在于自主知识产权不容易得到保护,尤其是对于标准协议IP(如USB3.0),即使对代码进行加密,同一个IP的加密代码仍可被重复地用在不同的SOC项目中。
关于固核(Firm IP):RTL程序经过仿真验证,符合设计要求后,设计者借助电子设计自动化工具(EDA),从单元库(Cell Library)中选取相对应的逻辑门,将RTL文件转换成以逻辑门单元形式呈现的网表(Netlist)文件,该网表文件即所谓的固核。固核是软核与硬核的折中,其相比于软核具有 更高的可靠性,相比于硬核具有更高的灵活性,但固核仍无法像软核一样根据客户的需求进行逻辑修改。
关于硬核(Hard IP):网表文件经过验证后,进入实体设计的步骤,先进行功能组块的位置配置设计(Floor Planning),再进行布局与布线设计(Place&Routing),做完实体的布局与布线后所产生的GDSII文件,即为硬核。硬核设计时工艺已经完成且无法修改,用户得到的硬核仅是产品功能而不是产品设计,因此硬核的设计与制造厂商对它实行全权控制,且相对于软核与固核,硬核的知识产权保护也比较简单。
USB设备是一种被广泛应用的标准IP,采取有效的措施对其进行知识产权保护已成为业界亟需拓展的研究方向,但目前的现有技术仍未能解决该项技术问题。
在现有技术中,通常通过对软件或硬件加密进行保护,加密之后还是有被破解的可能。尤其时在交付软核的情况下,因为灵活性较高,可由客户修改寄存器,来修改生成不同的IP版本。容易被芯片厂商修改多个版本流片。一旦做成产品难以识别侵权,无论软件源码,还是硬件源码均不可见,难以识别侵权。
发明内容
为解决现有技术的不足,本发明的目的在于提供一种基于USB协议的USB设备IP侵权识别方法及其终端。
为了实现上述目标,本发明采用如下的技术方案:
基于USB协议的基于USB协议的USB设备IP侵权识别方法,其特征在于,包括以下步骤:
S1、在USB待测主机对端接入一个侵权识别设备;
S2、USB待测主机进入Compliance模式;
S3、侵权识别设备对USB待测主机发送X.LFPS文件;
S4、在USB待测主机收到X.LFPS文件后,USB待测主机向侵权识别设备发送IP版权信息;
S5、根据IP版权信息判断USB待测主机是否侵权。
作为本发明的进一步优选,所述步骤S1中,在USB待测主机与侵权识别设备之间连接USB协议分析仪。
作为本发明的进一步优选,步骤S3中,X.LFPS文件不能与USB协议中的LFPS重复。
作为本发明的进一步优选,所述步骤S4中,USB待测主机向侵权识别设备发送IP版权信息后,USB协议分析仪通过抓取USB待测主机发送的IP版权信息,进行IP版权信息判断。
作为本发明的进一步优选,其特征在于,基于的USB协议为USB3.0以上协议,包括USB3.0协议。
基于USB协议的基于USB协议的USB设备IP侵权识别终端,其特征在于,包括侵权识别设备和USB协议分析仪,所述侵权识别设备用于使USB待测主机进入Compliance模式,并向USB待测主机发送X.LFPS文件;所述USB协议分析仪用于转送侵权识别设备发送的X.LFPS文件、转送USB待测主机发送的IP版权信息,并与IP版权信息进行抓取、判断。
本发明的有益之处在于:本发明结构简单,操作便利,容易实现;利用USB协议规定的compliance模式做侵权识别,更加稳定可靠,还可以节省成本;本发明提供侵权识别方法,侵权识别方式更灵活,识别方式更隐蔽;本发明不仅能够识别IP侵权;还能够识别用该IP制成的产品侵权。
图1是本发明的遵循的标准协议中描述的状态机;
图2是本发明的遵循的USB标准协议中定义的compliance支持的标准序列;
图3是本发明的遵循的USB标准协议中关于LFPS的信号的组成介绍;
图4是本发明的遵循的USB标准协议中用到的几种LFPS的时序要求;
图5本发明一实施例中基于USB协议的USB设备IP侵权识别方法的流程示意图;
图6本发明一实施例中基于USB协议的USB设备IP侵权识别方法的流程示意图;
图7是本发明一实施例中基于USB协议的USB设备IP侵权识别终端的结构连接图。
以下结合附图和具体实施例对本发明作具体的介绍。
根据USB3.0以上协议USB设备在链路层有一个compliance模式,用于做transmitter receiver的测试。
根据USB协议,USB设备IP在Polling状态,当第一个LFPS超时进入时,USB设备进入compliance模式,随后向对端发送Ping.LFPS。
通常对端是一个专用测试设备,USB设备此时作为待测设备。
待测试USB设备接收到Ping.LFPS之后就会发送一种Compliance pattern。
LFPS在USB协议中的描述如下,设计不同的tBurst、tRepeat时间,可以编码不同的LFPS作为不同的功能。
结合图5-6,基于USB协议的基于USB协议的USB设备IP侵权识别方法,其特征在于,包括以下步骤:
S1、在USB待测主机对端接入一个侵权识别设备,在USB待测主机与侵权识别设备之间连接USB协议分析仪;
S2、USB待测主机进入Compliance模式;
S3、侵权识别设备对USB待测主机发送X.LFPS文件;
X.LFPS要求严格区别与Ping.LFPS,且不和USB协议中已有的LFPS重复。
LFPS的tBurst、tRepeat,的具体值可以有很多,只要能有效发出,有效识别即可;
S4、在USB待测主机收到X.LFPS文件后,USB待测主机向侵权识别设备发送IP版权信息,USB待测主机向侵权识别设备发送IP版权信息后,USB协议分析仪通过抓取USB待测主机发送的IP版权信息;
S5、根据IP版权信息判断USB待测主机是否侵权。
本发明基于的USB协议为USB3.0以上协议,包括USB3.0协议。
结合图7,基于USB协议的基于USB协议的USB设备IP侵权识别终端,其特征在于,包括侵权识别设备和USB协议分析仪,所述侵权识别设备用于使USB待测主机进入Compliance模式,并向USB待测主机发送X.LFPS文件;所述USB协议分析仪用于转送侵权识别设备发送的X.LFPS文件、转送USB待测主机发送的IP版权信息,并与IP版权信息进行抓取、判断。
本发明的有益之处在于:本发明结构简单,操作便利,容易实现;利用USB协议规定的compliance模式做侵权识别,更加稳定可靠,还可以节省成本;本发明提供侵权识别方法,侵权识别方式更灵活,识别方式更隐蔽;本发明不仅能够识别IP侵权;还能够识别用该IP制成的产品侵权。
以上显示和描述了本发明的基本原理、主要特征和优点。本行业的技术人员应该了解,上述实施例不以任何形式限制本发明,凡采用等同替换或等效变换的方式所获得的技术方案,均落在本发明的保护范围内。
Claims (6)
- 基于USB协议的基于USB协议的USB设备IP侵权识别方法,其特征在于,包括以下步骤:S1、在USB待测主机对端接入一个侵权识别设备;S2、USB待测主机进入Compliance模式;S3、侵权识别设备对USB待测主机发送X.LFPS文件;S4、在USB待测主机收到X.LFPS文件后,USB待测主机向侵权识别设备发送IP版权信息;S5、根据IP版权信息判断USB待测主机是否侵权。
- 根据权利要求1所述的基于USB协议的USB设备IP侵权识别方法,其特征在于,所述步骤S1中,在USB待测主机与侵权识别设备之间连接USB协议分析仪。
- 根据权利要求1所述的基于USB协议的USB设备IP侵权识别方法,其特征在于,步骤S3中,X.LFPS文件不能与USB协议中的LFPS重复。
- 根据权利要求2所述的基于USB协议的USB设备IP侵权识别方法,其特征在于,所述步骤S4中,USB待测主机向侵权识别设备发送IP版权信息后,USB协议分析仪通过抓取USB待测主机发送的IP版权信息,进行IP版权信息判断。
- 根据权利要求1-4中任一项所述的基于USB协议的USB设备IP侵权识别方法,其特征在于,基于的USB协议为USB3.0以上协议,包括USB3.0协议。
- 基于USB协议的基于USB协议的USB设备IP侵权识别终端,其特征在于,包括侵权识别设备和USB协议分析仪,所述侵权识别设备用于使USB待测主机进入Compliance模式,并向USB待测主机发送X.LFPS文件; 所述USB协议分析仪用于转送侵权识别设备发送的X.LFPS文件、转送USB待测主机发送的IP版权信息,并与IP版权信息进行抓取、判断。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/270,065 US11977609B2 (en) | 2020-12-29 | 2021-01-29 | USB device IP infringement identification method and terminal based on USB protocol |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011602067.4 | 2020-12-29 | ||
CN202011602067.4A CN112597444B (zh) | 2020-12-29 | 2020-12-29 | 基于usb协议的usb设备ip侵权识别方法及其终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022141731A1 true WO2022141731A1 (zh) | 2022-07-07 |
Family
ID=75203909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/074379 WO2022141731A1 (zh) | 2020-12-29 | 2021-01-29 | 基于usb协议的usb设备ip侵权识别方法及其终端 |
Country Status (3)
Country | Link |
---|---|
US (1) | US11977609B2 (zh) |
CN (1) | CN112597444B (zh) |
WO (1) | WO2022141731A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104123212A (zh) * | 2014-07-21 | 2014-10-29 | 四川和芯微电子股份有限公司 | Usb芯片的***测试方法 |
CN109102436A (zh) * | 2018-06-22 | 2018-12-28 | 芯启源(上海)半导体科技有限公司 | 基于usb3.0协议ts1训练序列的ip软核产权保护与侵权鉴定方法 |
CN110018977A (zh) * | 2019-03-20 | 2019-07-16 | 芯启源(上海)半导体科技有限公司 | 基于usb协议的侵权识别方法、***、终端、及介质 |
US20200034323A1 (en) * | 2018-07-30 | 2020-01-30 | Texas Instruments Incorporated | Embedded universal serial bus 2 repeater |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060185020A1 (en) * | 2005-02-16 | 2006-08-17 | Ide Technologies, Inc. | Software piracy protection device |
JP2007323321A (ja) * | 2006-05-31 | 2007-12-13 | Toshiba Corp | 半導体記憶装置およびそのデータ送信方法 |
US8560864B2 (en) * | 2008-03-26 | 2013-10-15 | Fego Precision Industrial Co., Ltd. | Firewall for removable mass storage devices |
KR101042246B1 (ko) * | 2009-10-09 | 2011-06-17 | 한국전자통신연구원 | 침해방지용 보안 usb 커넥터 및 이를 이용한 침해 방지 시스템 |
US9817778B2 (en) * | 2014-12-19 | 2017-11-14 | Kabushiki Kaisha Toshiba | Electronic device and method for communicating with USB device |
CN109214144B (zh) * | 2018-08-01 | 2020-11-10 | 芯启源(上海)半导体科技有限公司 | 基于usb3.2协议ts2训练序列的ip软核产权保护与侵权鉴定方法 |
-
2020
- 2020-12-29 CN CN202011602067.4A patent/CN112597444B/zh active Active
-
2021
- 2021-01-29 WO PCT/CN2021/074379 patent/WO2022141731A1/zh active Application Filing
- 2021-01-29 US US18/270,065 patent/US11977609B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104123212A (zh) * | 2014-07-21 | 2014-10-29 | 四川和芯微电子股份有限公司 | Usb芯片的***测试方法 |
CN109102436A (zh) * | 2018-06-22 | 2018-12-28 | 芯启源(上海)半导体科技有限公司 | 基于usb3.0协议ts1训练序列的ip软核产权保护与侵权鉴定方法 |
US20200034323A1 (en) * | 2018-07-30 | 2020-01-30 | Texas Instruments Incorporated | Embedded universal serial bus 2 repeater |
CN110018977A (zh) * | 2019-03-20 | 2019-07-16 | 芯启源(上海)半导体科技有限公司 | 基于usb协议的侵权识别方法、***、终端、及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN112597444B (zh) | 2024-01-09 |
US20230394121A1 (en) | 2023-12-07 |
US11977609B2 (en) | 2024-05-07 |
CN112597444A (zh) | 2021-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Reverse engineering circuits using behavioral pattern mining | |
Rashinkar et al. | System-on-a-chip Verification: Methodology and Techniques | |
CN107077409B (zh) | 用于在电子***中进行多接口调试的方法和装置 | |
KR20130040259A (ko) | 외부 인터페이스들의 기능성을 검증하기 위한 자체-테스트 특징을 갖는 집적 회로 | |
US20080301603A1 (en) | Clock-gated model transformation for asynchronous testing of logic targeted for free-running, data-gated logic | |
CN105760612A (zh) | 用于硅后芯片验证的断言检测装置、方法、***、芯片 | |
US20110225559A1 (en) | Logic verifying apparatus, logic verifying method, and medium | |
Pevtsov et al. | Design for testability of integrated circuits and project protection difficulties | |
WO2022141731A1 (zh) | 基于usb协议的usb设备ip侵权识别方法及其终端 | |
US6654935B2 (en) | IP validation method and IP verified by the IP validation method | |
Zhao et al. | Analysis of interconnect crosstalk defect coverage of test sets | |
Karimi et al. | Testing of clock-domain crossing faults in multi-core system-on-chip | |
Girdhar et al. | Design and verification of AMBA APB protocol | |
US20030135838A1 (en) | Method and apparatus for isolating the root of indeterminate logic values in an HDL simulation | |
CN109214144B (zh) | 基于usb3.2协议ts2训练序列的ip软核产权保护与侵权鉴定方法 | |
CN109102436B (zh) | 基于usb3.0协议ts1训练序列的ip软核产权保护与侵权鉴定方法 | |
KR20170004849A (ko) | 프로토콜 기반 자동 테스터 자극 발생기 | |
CN110018977A (zh) | 基于usb协议的侵权识别方法、***、终端、及介质 | |
CN109165482B (zh) | 基于usb3.1协议ts1训练序列的ip软核产权保护与侵权鉴定方法 | |
CN109214143B (zh) | 基于usb3.2协议ts1训练序列的ip软核产权保护与侵权鉴定方法 | |
CN109165481B (zh) | 基于usb3.0协议ts2训练序列的ip软核产权保护与侵权鉴定方法 | |
CN109145527B (zh) | 基于usb3.1协议ts2训练序列的ip软核产权保护与侵权鉴定方法 | |
Neishaburi et al. | Hierarchical trigger generation for post-silicon debugging | |
JP6052847B2 (ja) | トランザクション処理装置及び不正トランザクション検出方法 | |
JPH07121576A (ja) | 故障シミュレーション装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21912510 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21912510 Country of ref document: EP Kind code of ref document: A1 |