CN109145527B - IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence - Google Patents
IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence Download PDFInfo
- Publication number
- CN109145527B CN109145527B CN201810651407.9A CN201810651407A CN109145527B CN 109145527 B CN109145527 B CN 109145527B CN 201810651407 A CN201810651407 A CN 201810651407A CN 109145527 B CN109145527 B CN 109145527B
- Authority
- CN
- China
- Prior art keywords
- training sequence
- protection
- information
- identification information
- protection identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Information Transfer Systems (AREA)
Abstract
本发明提供基于USB3.1协议TS2训练序列的IP软核产权保护与侵权鉴定方法,其中,基于USB3.1协议TS2训练序列的IP软核产权保护方法应用于USB3.1设备,包括:检测是否满足预设的保护识别模式的触发条件;若是,则将当前工作状态切换至所述保护识别模式;其中,于所述保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列的保留字节中携带有保护识别信息。本发明采用与USB3.1协议深度绑定的方式,有效地实现了对USB3.1软核的知识产权保护与鉴定。
The invention provides an IP soft core property rights protection and infringement identification method based on the USB3.1 protocol TS2 training sequence, wherein the IP soft core property rights protection method based on the USB3.1 protocol TS2 training sequence is applied to a USB3.1 device, including: detecting whether Meet the trigger condition of the preset protection identification mode; if so, switch the current working state to the protection identification mode; wherein, in the working state of the protection identification mode, and in the Polling.Configuration state and/or Recovery. The reserved bytes of the TS2 training sequence sent from the Configuration state to the USB host carry protection identification information. The present invention effectively realizes the intellectual property protection and identification of the USB3.1 soft core by deeply binding with the USB3.1 protocol.
Description
技术领域technical field
本发明涉及USB设备的硅知识产权技术领域,特别是涉及基于USB3.1协议的TS2训练序列的IP软核的产权保护方法及装置、及基于USB3.1协议的TS2训练序列的IP软核的侵权鉴定方法及装置,以及相应的存储介质和电子设备。The present invention relates to the technical field of silicon intellectual property rights of USB devices, in particular to a method and device for protecting property rights of an IP soft core based on a TS2 training sequence of the USB3.1 protocol, and an IP soft core based on the TS2 training sequence of the USB3.1 protocol. Infringement identification method and device, and corresponding storage medium and electronic equipment.
背景技术Background technique
USB是英文Universal Serial Bus(通用串行总线)的缩写,是一种外部总线标准,用于规范电脑与外部设备的连接和通讯。USB接口支持设备的即插即用和热插拔功能。USB标准于1994年底由英特尔、康柏、IBM、Microsoft等多家公司联合提出,现已经被广泛应用于电脑、手机、数码相机等各类电子设备。USB标准由USB官方组织USB-IF制定和维护,从开始至今依次发布了USB1.1、USB2.0、USB3.0、USB3.1和USB3.2共五个版本,新版本前向兼容旧版本。每个版本支持的最大传输速率分布为:USB1.1:12Mbps;USB2.0:480Mbps;USB3.0:5Gbps;USB3.1:10Gbps;USB3.2:20Gbps。USB is the abbreviation of Universal Serial Bus (Universal Serial Bus) in English. It is an external bus standard used to regulate the connection and communication between computers and external devices. The USB interface supports plug-and-play and hot-plugging of the device. The USB standard was jointly proposed by Intel, Compaq, IBM, Microsoft and other companies at the end of 1994, and has been widely used in various electronic devices such as computers, mobile phones, and digital cameras. The USB standard is formulated and maintained by USB-IF, an official USB organization. Since the beginning, five versions of USB1.1, USB2.0, USB3.0, USB3.1 and USB3.2 have been released in sequence. The new version is forward compatible with the old version. . The maximum transfer rate supported by each version is distributed as follows: USB1.1: 12Mbps; USB2.0: 480Mbps; USB3.0: 5Gbps; USB3.1: 10Gbps; USB3.2: 20Gbps.
硅知识产权(SIP,Silicon Intellectual Property)是指芯片(IC)行业内一种事先定义、经验证可以重复使用的、能完成特定功能的模块。随着芯片复杂度和集成度的提升,处理器、存储器、I/O端口以及模拟电路都集成在一个硅片上,组成一个完整的片上系统(SOC,System On Chip),如果每一次新的SOC产品的每个模块都要从头设计然后再进行系统整合和验证,势必会导致开发周期的延长,并且设计的质量也将难于控制。因此,重复使用预先设计并验证过的集成电路模块(IP)是当今业界最有效的解决方案。Silicon Intellectual Property (SIP, Silicon Intellectual Property) refers to a pre-defined, verified reusable module in the chip (IC) industry that can perform specific functions. As the complexity and integration of chips increase, processors, memories, I/O ports, and analog circuits are all integrated on one silicon chip to form a complete system on chip (SOC, System On Chip). Each module of the SOC product must be designed from scratch and then integrated and verified, which will inevitably lead to a prolonged development cycle, and the quality of the design will be difficult to control. Therefore, reusing pre-designed and validated integrated circuit modules (IP) is the most efficient solution in the industry today.
从设计流程进行区分,可将IP分为软核、固核、硬核三种类型:From the design process, IP can be divided into three types: soft core, solid core, and hard core:
1、IP软核(Soft IP)1. Soft IP (Soft IP)
在逻辑IC设计的过程中,IC设计者会在系统规格制定完成后,使用硬件描述语言将系统所需的功能写出寄存器传输级(RTL,Register Transfer Level)的程序,这个RTL文件就被称为IP软核。In the process of logic IC design, the IC designer will use the hardware description language to write the functions required by the system out of the register transfer level (RTL, Register Transfer Level) program after the system specification is completed. This RTL file is called It is an IP soft core.
由于IP软核是以源代码的形式提供,所以具有较高的灵活性,可经用户修改来实现所需要的电路系统设计,且与具体的实现工艺无关,但缺点是自主知识产权不容易得到保护,尤其是对于标准协议IP(如USB3.1),即使对代码进行加密,客户仍可将同一个IP的加密代码重复的在不同的SOC项目中使用。Since the IP soft core is provided in the form of source code, it has high flexibility and can be modified by the user to realize the required circuit system design, and has nothing to do with the specific implementation process, but the disadvantage is that independent intellectual property rights are not easy to obtain. Protection, especially for standard protocol IP (such as USB3.1), even if the code is encrypted, customers can still use the encrypted code of the same IP repeatedly in different SOC projects.
2、IP固核(Firm IP)2. IP solid core (Firm IP)
RTL程序经过仿真验证,符合设计要求后,设计者借助电子设计自动化工具(EDA),从单元库(Cell Library)中选取相对应的逻辑门,将RTL文件转换成以逻辑门单元形式呈现的网表(Netlist)文件,这个网表文件即所谓的IP固核。After the RTL program is verified by simulation and meets the design requirements, the designer selects the corresponding logic gate from the Cell Library with the help of Electronic Design Automation Tool (EDA), and converts the RTL file into a network presented in the form of logic gate units. Table (Netlist) file, this netlist file is the so-called IP solid core.
IP固核是IP软核和IP硬核的折中,它比IP软核的可靠性高,比IP硬核的灵活性强,但无法像IP软核一样根据客户的需求进行逻辑修改。The IP solid core is a compromise between the IP soft core and the IP hard core. It is more reliable than the IP soft core and more flexible than the IP hard core, but it cannot be logically modified according to customer needs like the IP soft core.
3、IP硬核(Hard IP)3. Hard IP
网表文件经过验证后,进入实体设计的步骤,先进行功能组块的位置配置设计(Floor Planning),再进行布局与布线设计(Place&Routing),做完实体的布局与布线后所产生的GDSII文件,即为IP硬核。After the netlist file is verified, enter the step of physical design, first perform the location configuration design (Floor Planning) of the functional block, and then perform the layout and routing design (Place&Routing), and the GDSII file generated after the physical layout and routing is completed. , which is the IP hard core.
IP硬核的设计与工艺已经完成且无法修改,用户得到的IP硬核仅是产品功能而不是产品设计,因此IP硬核的设计与制造厂商对它实行全权控制。相对于IP软核和IP固核,IP硬核的知识产权保护也比较简单。The design and process of the IP hard core have been completed and cannot be modified. The IP hard core obtained by the user is only a product function rather than a product design. Therefore, the design and manufacturer of the IP hard core exercise full control over it. Compared with the IP soft core and the IP solid core, the intellectual property protection of the IP hard core is relatively simple.
USB3.1 IP是一种被广泛应用的标准IP,采取有效的措施对其进行知识产权保护是十分必要的。然而,本领域鲜有对USB3.1设备的IP软核进行知识产权保护的研究方案。USB3.1 IP is a widely used standard IP, and it is necessary to take effective measures to protect its intellectual property. However, there are few research solutions for IP soft core protection of USB3.1 devices in the field.
发明内容SUMMARY OF THE INVENTION
鉴于以上所述现有技术的缺点,本发明的目的在于提供基于USB3.1协议TS2训练序列的IP软核产权保护与侵权鉴定方法,用于解决现有技术中难以对USB3.1设备的IP软核进行知识产权保护的技术问题。In view of the above-mentioned shortcomings of the prior art, the purpose of the present invention is to provide an IP soft-core property rights protection and infringement identification method based on the USB3.1 protocol TS2 training sequence, which is used to solve the problem of IP soft-core IP protection of USB3.1 devices in the prior art. The technical issues of intellectual property protection for soft cores.
为实现上述目的及其他相关目的,本发明提供一种基于USB3.1协议TS2训练序列的IP软核产权保护方法,应用于USB3.1设备,所述方法包括:检测是否满足预设的保护识别模式的触发条件;若是,则将当前工作状态切换至所述保护识别模式;其中,于所述保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列的保留字节中携带有保护识别信息。In order to achieve the above purpose and other related purposes, the present invention provides a IP soft core property rights protection method based on the USB3.1 protocol TS2 training sequence, applied to a USB3.1 device, the method includes: detecting whether a preset protection identification is satisfied The trigger condition of the mode; if so, switch the current working state to the protection identification mode; wherein, in the working state of the protection identification mode, and in the Polling.Configuration state and/or Recovery.Configuration state to the USB host The reserved bytes of the sent TS2 training sequence carry protection identification information.
于本发明一实施例中,所述预设的保护识别模式的触发条件包括:触发条件1)接收到处于Polling.Configuration状态和/或Recovery.Configuration状态的USB主机所发送的保留字节中携带有特定信息的TS2训练序列;和/或触发条件2)接收到处于U0状态的USB主机所发送的携带有特定信息的用户测试链路管理数据包;其中,在满足所述触发条件1)时,所述USB3.1设备相应地进入Polling.Configuration状态和/或Recovery.Configuration状态,并向所述USB主机发送保留字节中携带有保护识别信息的TS2训练序列;在满足所述触发条件2)时,所述USB3.1设备进入Recovery.Configuration状态,并向所述USB主机发送保留字节中携带有保护识别信息的TS2训练序列。In an embodiment of the present invention, the triggering condition of the preset protection identification mode includes: triggering condition 1) receiving a reserved byte sent by a USB host in the Polling.Configuration state and/or Recovery.Configuration state to carry TS2 training sequence with specific information; and/or trigger condition 2) receiving a user test link management data packet carrying specific information sent by the USB host in the U0 state; wherein, when the trigger condition 1) is satisfied , the USB3.1 device correspondingly enters the Polling.Configuration state and/or the Recovery.Configuration state, and sends the TS2 training sequence carrying the protection identification information in the reserved bytes to the USB host; when the
于本发明一实施例中,所述在Polling.Configuration状态和/或Recovery.Configuration状态下向USB主机发送TS2训练序列的步骤还包括:周期性地发送保留字节中携带有保护信息的TS2训练序列;其中,周期内的各所述保护识别信息按时间先后顺序排列形成授权客户名称、产品批次信息、和/或授权时间信息。In an embodiment of the present invention, the step of sending the TS2 training sequence to the USB host in the Polling.Configuration state and/or the Recovery.Configuration state further includes: periodically sending the TS2 training sequence that carries the protection information in the reserved bytes. Sequence; wherein, the protection identification information in the period is arranged in chronological order to form authorized customer name, product batch information, and/or authorized time information.
于本发明一实施例中,所述保留字节为所述TS2训练序列的第五个字节。In an embodiment of the present invention, the reserved byte is the fifth byte of the TS2 training sequence.
于本发明一实施例中,所述保护识别信息预先采用ASCII码编码生成。In an embodiment of the present invention, the protection identification information is generated in advance using ASCII code encoding.
于本发明一实施例中,所述方法还包括:在重新上电或接收到由USB主机所发送的复位请求后,退出所述保护识别模式。In an embodiment of the present invention, the method further includes: exiting the protection identification mode after re-powering on or receiving a reset request sent by the USB host.
为实现上述目的及其他相关目的,本发明提供一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定方法,应用于USB协议分析设备,所述方法包括:捕获USB3.1设备于保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列;提取所述TS2训练序列的保留字节中的保护识别信息;判断所述保护识别信息是否与预设保护识别信息相匹配;若否,则认定所述USB3.1设备侵权。In order to achieve the above purpose and other related purposes, the present invention provides an IP soft core infringement identification method based on the USB3.1 protocol TS2 training sequence, which is applied to a USB protocol analysis device. The method includes: capturing the USB3.1 device for protection identification TS2 training sequence sent to the USB host in the working state of the mode and in the Polling.Configuration state and/or Recovery.Configuration state; extract the protection identification information in the reserved bytes of the TS2 training sequence; determine the protection identification Whether the information matches the preset protection identification information; if not, it is determined that the USB3.1 device is infringing.
于本发明一实施例中,所述方法还包括:若所述TS2训练序列的保留字节中不存在所述保护识别信息,则认定所述USB3.1设备不是目标设备。In an embodiment of the present invention, the method further includes: if the protection identification information does not exist in the reserved bytes of the TS2 training sequence, determining that the USB3.1 device is not a target device.
于本发明一实施例中,所述方法还包括:连续捕获一定时间或一定数量的所述TS2训练序列;提取捕获的各所述TS2训练序列的保护识别信息,并将各所述保护识别信息按时间先后顺序排列以还原授权客户名称、产品批次信息、和/或授权时间信息;判断所述授权客户名称、产品批次信息、和/或授权时间信息是否与所述USB3.1设备的制造商的对应信息相匹配;若否,则认定所述USB3.1设备侵权。In an embodiment of the present invention, the method further includes: continuously capturing the TS2 training sequences for a certain period of time or a certain number; extracting the protection identification information of each of the captured TS2 training sequences, and converting the protection identification information Arrange in chronological order to restore the authorized customer name, product batch information, and/or authorization time information; determine whether the authorized customer name, product batch information, and/or authorization time information is the same as that of the USB3.1 device. The corresponding information of the manufacturer matches; if not, it is determined that the USB3.1 device is infringing.
于本发明一实施例中,所述提取捕获的各所述TS2训练序列的保护识别信息并按时间先后顺序排列的步骤还包括:采用ASCII码对各所述保护识别信息进行译码;将译码后的各所述保护识别信息按时间先后顺序排列。In an embodiment of the present invention, the step of extracting the captured protection identification information of each of the TS2 training sequences and arranging them in chronological order further includes: using ASCII code to decode each protection identification information; The protection identification information after the code is arranged in chronological order.
为实现上述目的及其他相关目的,本发明提供一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定方法,应用于USB主机,所述方法包括:在Polling.Configuration状态和/或Recovery.Configuration状态下,向USB3.1设备发送保留字节中携带有特定信息的TS2训练序列,并查看所述USB3.1设备是否进入保护识别模式;若否,则认定所述USB3.1设备不是目标设备;和/或在U0状态下,向USB3.1设备发送携带有特定信息的用户测试链路管理数据包,并查看所述USB3.1设备是否进入保护识别模式;若否,则认定所述USB3.1设备不是目标设备。In order to achieve the above object and other related objects, the present invention provides an IP soft core infringement identification method based on the USB3.1 protocol TS2 training sequence, which is applied to a USB host, and the method includes: in Polling.Configuration state and/or Recovery. In the Configuration state, send a TS2 training sequence with specific information in the reserved bytes to the USB3.1 device, and check whether the USB3.1 device enters the protection identification mode; if not, it is determined that the USB3.1 device is not the target device; and/or in the U0 state, send a user test link management data packet carrying specific information to the USB3.1 device, and check whether the USB3.1 device enters the protection identification mode; if not, it is determined that the USB3.1 devices are not target devices.
为实现上述目的及其他相关目的,本发明提供一种基于USB3.1协议TS2训练序列的IP软核产权保护装置,应用于USB3.1设备,所述装置包括:模式转换模块,用于检测是否满足预设的保护识别模式的触发条件;若是,则将当前工作状态切换至所述保护识别模式;序列发送模块,用于在所述保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机发送保留字节中携带有保护识别信息的TS2训练序列。In order to achieve the above purpose and other related purposes, the present invention provides an IP soft core property rights protection device based on the USB3.1 protocol TS2 training sequence, which is applied to USB3.1 equipment. The device includes: a mode conversion module for detecting whether Meet the triggering condition of the preset protection identification mode; if so, switch the current working state to the protection identification mode; the sequence sending module is used to be in the working state of the protection identification mode, and in the Polling.Configuration state and / or the Recovery.Configuration state sends the TS2 training sequence with the protection identification information in the reserved bytes to the USB host.
为实现上述目的及其他相关目的,本发明提供一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定装置,应用于USB协议分析设备,所述装置包括:序列捕获模块,用于捕获USB3.1设备于保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列;信息提取模块,用于提取所述TS2训练序列的保留字节中的保护识别信息;侵权鉴定模块,用于判断所述保护识别信息是否与预设保护识别信息相匹配;若否,则认定所述USB3.1设备侵权。In order to achieve the above object and other related purposes, the present invention provides an IP soft core infringement identification device based on the USB3.1 protocol TS2 training sequence, which is applied to a USB protocol analysis device. The device includes: a sequence capture module for capturing USB3 .1 The TS2 training sequence sent by the device to the USB host in the state of Polling.Configuration and/or Recovery.Configuration under the working state of the protection identification mode; an information extraction module for extracting the reserved words of the TS2 training sequence The protection identification information in the section; the infringement identification module is used to judge whether the protection identification information matches the preset protection identification information; if not, it is determined that the USB3.1 device is infringing.
为实现上述目的及其他相关目的,本发明提供一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定装置,应用于USB主机,所述装置包括:序列发送模块,用于在Polling.Configuration状态和/或Recovery.Configuration状态下向USB3.1设备发送保留字节中携带有特定信息的TS2训练序列;和/或用于在U0状态下向USB3.1设备发送携带有特定信息的用户测试链路管理数据包;侵权鉴定模块,用于查看所述USB3.1设备是否进入保护识别模式;若否,则认定所述USB3.1设备不是目标设备。In order to achieve the above purpose and other related purposes, the present invention provides an IP soft core infringement identification device based on the USB3.1 protocol TS2 training sequence, which is applied to a USB host. The TS2 training sequence with specific information in the reserved bytes is sent to the USB3.1 device in the state and/or Recovery.Configuration state; and/or used to send the user test carrying the specific information to the USB3.1 device in the U0 state Link management data packet; infringement identification module, used to check whether the USB3.1 device enters the protection identification mode; if not, it is determined that the USB3.1 device is not a target device.
为实现上述目的及其他相关目的,本发明提供一种存储介质,其中存储有计算机程序,所述计算机程序被处理器加载执行时,实现如上任一所述的方法。In order to achieve the above object and other related objects, the present invention provides a storage medium, in which a computer program is stored, and when the computer program is loaded and executed by a processor, any one of the above methods is implemented.
为实现上述目的及其他相关目的,本发明提供一种电子设备,包括:通信器、处理器、及存储器;其中,所述通信器用于建立所述电子设备与外部设备的通信连接;所述存储器用于存储计算机程序;所述处理器用于加载执行所述计算机程序,以使所述电子设备执行如上任一所述的方法。In order to achieve the above object and other related objects, the present invention provides an electronic device, comprising: a communicator, a processor, and a memory; wherein, the communicator is used to establish a communication connection between the electronic device and an external device; the memory used to store a computer program; the processor is used to load and execute the computer program, so that the electronic device executes any of the above methods.
如上所述,本发明的基于USB3.1协议TS2训练序列的IP软核产权保护与侵权鉴定方法,基于USB3.1协议,在TS2训练序列中增加内嵌式保护识别代码,从而对USB3.1设备的IP软核进行有效的知识产权保护。同时,提供了针对该知识产权保护方案的侵权鉴定技术,当在IP软核在未经授权的情况下被使用或做成产品时,通过触发保护识别代码即可进行侵权鉴别与举证。As mentioned above, the IP soft core property rights protection and infringement identification method based on the USB3.1 protocol TS2 training sequence of the present invention is based on the USB3.1 protocol, and an embedded protection identification code is added to the TS2 training sequence, so that the USB3.1 The IP soft core of the device performs effective intellectual property protection. At the same time, an infringement identification technology for this intellectual property protection scheme is provided. When the IP soft core is used or made into a product without authorization, the infringement identification and proof can be carried out by triggering the protection identification code.
附图说明Description of drawings
图1显示为本发明一实施例中的基于USB3.1协议的TS2训练序列的IP软核保护方法的流程示意图。FIG. 1 is a schematic flowchart of an IP soft core protection method based on a TS2 training sequence of the USB3.1 protocol according to an embodiment of the present invention.
图2A显示为本发明一实施例中的用户测试链路管理数据包的结构示意图。FIG. 2A is a schematic structural diagram of a user test link management data packet according to an embodiment of the present invention.
图2B显示为本发明一实施例中的USB3.1在Polling子状态之间的跳转示意图。FIG. 2B is a schematic diagram showing the transition between the Polling sub-states of USB 3.1 according to an embodiment of the present invention.
图3显示为本发明一实施例中的基于USB3.1协议的TS2训练序列的IP软核侵权鉴定方法的流程示意图。FIG. 3 is a schematic flowchart of an IP soft core infringement identification method based on the TS2 training sequence of the USB3.1 protocol according to an embodiment of the present invention.
图4显示为本发明另一实施例中的基于USB3.1协议的TS2训练序列的IP软核侵权鉴定方法的流程示意图。FIG. 4 is a schematic flowchart of an IP soft core infringement identification method based on the TS2 training sequence of the USB3.1 protocol according to another embodiment of the present invention.
图5显示为本发明一实施例中的基于USB3.1协议的TS2训练序列的IP软核保护装置的模块示意图。FIG. 5 is a schematic block diagram of an IP soft core protection device based on the TS2 training sequence of the USB3.1 protocol according to an embodiment of the present invention.
图6显示为本发明一实施例中的基于USB3.1协议的TS2训练序列的IP软核侵权鉴定装置的模块示意图。FIG. 6 is a schematic block diagram of an IP soft core infringement identification device based on the TS2 training sequence of the USB3.1 protocol according to an embodiment of the present invention.
图7显示为本发明另一实施例中的基于USB3.1协议的TS2训练序列的IP软核侵权鉴定装置的模块示意图。FIG. 7 is a schematic block diagram of an IP soft core infringement identification device based on the TS2 training sequence of the USB3.1 protocol according to another embodiment of the present invention.
图8显示为本发明另一实施例中的电子设备的结构示意图。FIG. 8 is a schematic structural diagram of an electronic device in another embodiment of the present invention.
具体实施方式Detailed ways
以下通过特定的具体实例说明本发明的实施方式,本领域技术人员可由本说明书所揭露的内容轻易地了解本发明的其他优点与功效。本发明还可以通过另外不同的具体实施方式加以实施或应用,本说明书中的各项细节也可以基于不同观点与应用,在没有背离本发明的精神下进行各种修饰或改变。需说明的是,在不冲突的情况下,以下实施例及实施例中的特征可以相互组合。The embodiments of the present invention are described below through specific specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the following embodiments and features in the embodiments may be combined with each other under the condition of no conflict.
需要说明的是,以下实施例中所提供的图示仅以示意方式说明本发明的基本构想,遂图式中仅显示与本发明中有关的组件而非按照实际实施时的组件数目、形状及尺寸绘制,其实际实施时各组件的型态、数量及比例可为一种随意的改变,且其组件布局型态也可能更为复杂。It should be noted that the drawings provided in the following embodiments are only used to illustrate the basic concept of the present invention in a schematic way, so the drawings only show the components related to the present invention rather than the number, shape and number of components in actual implementation. For dimension drawing, the type, quantity and proportion of each component can be changed at will in actual implementation, and the component layout may also be more complicated.
参阅图1,本实施例提供一种基于USB3.1协议TS2训练序列的IP软核产权保护方法,用于对USB3.1设备(Device)的IP软核进行有效的知识产权保护。于此,USB3.1设备是指通过用USB3.1接口连接到USB主机(Host)上的所有设备,如常见的U盘、读卡器、移动硬盘、外置刻录机等等。所述方法由USB3.1设备负责执行,具体包括如下步骤:Referring to FIG. 1 , this embodiment provides a property rights protection method for an IP soft core based on the TS2 training sequence of the USB3.1 protocol, which is used to effectively protect the intellectual property rights of the IP soft core of a USB3.1 device (Device). Here, a USB3.1 device refers to all devices connected to a USB host (Host) through a USB3.1 interface, such as a common U disk, a card reader, a mobile hard disk, an external recorder, and the like. The method is executed by the USB3.1 device, and specifically includes the following steps:
S11:检测是否满足预设的保护识别模式的触发条件。若检测结果为是,则执行步骤S12;反之,则保持当前工作状态不变。S11: Detect whether the trigger condition of the preset protection identification mode is met. If the detection result is yes, execute step S12; otherwise, keep the current working state unchanged.
S12:将当前工作状态切换至所述保护识别模式。S12: Switch the current working state to the protection identification mode.
S13:在所述保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列的保留字节中携带有保护识别信息。S13: In the working state of the protection identification mode, and in the Polling.Configuration state and/or the Recovery.Configuration state, the reserved bytes of the TS2 training sequence sent to the USB host carry protection identification information.
以下将对步骤S11~S13做出详细解释。Steps S11 to S13 will be explained in detail below.
在正常工作模式下,USB3.1设备不会发送保护识别信息,只有当特定的触发条件满足后,USB3.1设备才会进入保护识别模式,并在之后发送的TS2训练序列中插入保护识别信息,又或者在之后发送预先携带有保护识别信息的TS2训练序列。也就是说,本发明中USB3.1设备向外发送携带有保护识别信息的TS2训练序列,至于保护识别信息何时被嵌入TS2训练序列,则不做具体限定,可以是在发送时被嵌入,也可以是在出厂前被嵌入。In the normal working mode, the USB3.1 device will not send the protection identification information. Only when the specific trigger conditions are met, the USB3.1 device will enter the protection identification mode, and insert the protection identification information into the TS2 training sequence sent later. , or send the TS2 training sequence that carries the protection identification information in advance. That is to say, in the present invention, the USB3.1 device sends the TS2 training sequence carrying the protection identification information to the outside. As for when the protection identification information is embedded in the TS2 training sequence, there is no specific limitation. It can also be embedded before leaving the factory.
以下列举了两种进入保护识别模式的触发条件:The two trigger conditions for entering the protection identification mode are listed below:
触发条件一、1)接收到处于Polling.Configuration状态的USB主机所发送的保留字节中携带有特定信息的一个或一定数量的TS2训练序列,和/或,2)接收到处于Recovery.Configuration状态的USB主机所发送的保留字节中携带有特定信息的一个或一定数量的TS2训练序列。
触发条件二、接收到处于U0状态的USB主机所发送的携带有特定信息的一个或一定数量的用户测试链路管理数据包。Trigger condition 2: Receive one or a certain number of user test link management data packets that carry specific information and are sent by the USB host in the U0 state.
在满足上述触发条件1)时,所述USB3.1设备相应地进入Polling.Configuration状态,并向所述USB主机发送保留字节中携带有保护识别信息的TS2训练序列;在满足上述触发条件2)时,所述USB3.1设备相应地进入Recovery.Configuration状态,并向所述USB主机发送保留字节中携带有保护识别信息的TS2训练序列。When the above trigger condition 1) is satisfied, the USB3.1 device enters the Polling.Configuration state accordingly, and sends a TS2 training sequence carrying protection identification information in the reserved bytes to the USB host; when the
在满足所述触发条件二时,所述USB3.1设备进入Recovery.Configuration状态,并向所述USB主机发送保留字节中携带有保护识别信息的TS2训练序列。图2A展示了一种用户测试链路管理数据包(Vendor Device Test Link Management Packet)的格式,特定信息位于DWORD1和/或DWORD2中,当USB3.1设备收到包含此特定信息的用户测试链路管理数据包后,进入保护识别模式,并进入Recovery状态。When the second trigger condition is satisfied, the USB3.1 device enters the Recovery.Configuration state, and sends a TS2 training sequence carrying protection identification information in the reserved bytes to the USB host. Figure 2A shows the format of a Vendor Device Test Link Management Packet, the specific information is located in DWORD1 and/or DWORD2, when the USB3.1 device receives the Vendor Device Test Link Management Packet containing this specific information After managing the packets, enter the protection identification mode and enter the Recovery state.
在触发条件一和触发条件二中,特定信息可以是预先设定的大、小写字母、数字或标点符号,还可以是由其中几种组合而成的字符串等。In
众所周知,从链路上电开始到正常工作(类似于将USB3.1的U盘插到笔记本的USB3.1接口上到能够正常开始读取数据)需要经历三个阶段:Rx.Detect、Polling、U0,其中,Polling(轮询)过程会对链路上的终端设备进行相关的初始化设置(也即表示Host和Device在初始化发送端和接收端并进行同步以准备进行数据包的发送);从Rx.Detect到U0的过程需要经历几个子过程,其中就包括在Polling.Configuration子状态中TS2训练序列的发送:双方设备通过向对方发送TS2训练序列进行相关参数的设置,并在收发到指定个数的TS2训练序列后完成握手,进入下一个子状态Poll.Idle;待完成整个链路的初始化就会进入U0阶段(正常工作状态,链路上具有数据包的发送和接收)。除此之外,USB3.1通信协议规定,发起方或接收方在链路出现可恢复性错误或者退出低功耗状态之后、进入工作状态之前会进入Recovery(恢复)状态,在该状态下会重复发送TS2训练序列,发起方或接收方可以在接收到对方发送的TS2训练序列时获知其已进入Recovery(恢复)状态或已退出低功耗状态。As we all know, from the power-on of the link to the normal operation (similar to inserting the USB3.1 U disk into the USB3.1 interface of the notebook until the data can be read normally), it needs to go through three stages: Rx.Detect, Polling, U0, in which, the Polling (polling) process will perform relevant initialization settings on the terminal devices on the link (that is, it means that the Host and Device are initializing the sender and receiver and synchronizing to prepare for sending data packets); The process from Rx.Detect to U0 needs to go through several sub-processes, including the sending of the TS2 training sequence in the Polling.Configuration sub-state: the two devices send the TS2 training sequence to each other to set relevant parameters, and send and receive to the designated After the number of TS2 training sequences, the handshake is completed, and the next sub-state Poll.Idle is entered; after the initialization of the entire link is completed, it will enter the U0 stage (normal working state, with data packets sent and received on the link). In addition, the USB3.1 communication protocol stipulates that the initiator or receiver will enter the Recovery (recovery) state after the link has a recoverable error or exit the low-power state, and before entering the working state, and will repeat the transmission in this state. TS2 training sequence, the initiator or receiver can know that it has entered the Recovery (recovery) state or has exited the low power consumption state when receiving the TS2 training sequence sent by the other party.
承接上述,根据USB3.1协议,TS2训练序列会在Polling.Configuration和Recovery.Configuration子状态发送,并完成握手,图2B显示了USB3.1在Polling子状态之间的跳转,其中Polling.Configuration是USB3.1进入工作状态必须经过的子状态,因此在TS2训练序列中插入保留识别代码可以有效地对IP进行保护和识别。Following the above, according to the USB3.1 protocol, the TS2 training sequence will be sent in the Polling.Configuration and Recovery.Configuration sub-states, and the handshake will be completed. Figure 2B shows the USB3.1 jump between the Polling sub-states, in which Polling.Configuration It is a sub-state that USB3.1 must go through to enter the working state, so inserting the reserved identification code in the TS2 training sequence can effectively protect and identify IP.
表1展示为USB3.1协议TS2训练序列的格式,其长度为16字节,本实施例优选地采用TS2训练序列的第5个符号位(即表1中的symbol number 4)作为保留字节来携带保护识别信息。原因是:根据USB3.1协议,保留字节发送方发送时默认设成零,接收方在收到后不做检查,因此使用4号保留字节携带保护识别信息不会影响USB3.1设备的正常工作。Table 1 shows the format of the TS2 training sequence of the USB3.1 protocol, and its length is 16 bytes. In this embodiment, the fifth symbol bit of the TS2 training sequence (that is, the
表1Table 1
根据TS2训练序列的定义,一个TS2训练序列中有一个字节的空间可以携带保留识别信息,因此,在一实施例中,采用美国信息交换标准代码(ASCII,American StandardCode for Information Interchange)的编码方式,将每个字节表示为一个大小写字母、数字或标点符号,在USB3.1设备进入保护识别模式后,通过在连续的TS2训练序列的保留字节中插入识别信息来完成对设备的标记。所谓对设备做标记是指我们的USB3.1设备进入保护识别模式后,在TS2训练序列的保留字节里具有保护识别信息,而其他的USB3.1设备则不具有此项功能,这样就可以有效地将我们的设备和其他的设备进行区分。此时,若某个USB3.1设备满足触发条件后没有进入保护识别模式,则说明该USB3.1设备使用的不是我们的IP软核,也就不存在侵权的问题。According to the definition of the TS2 training sequence, there is one byte of space in a TS2 training sequence that can carry reserved identification information. Therefore, in one embodiment, the encoding method of American Standard Code for Information Interchange (ASCII, American Standard Code for Information Interchange) is adopted. , each byte is represented as a capital letter, number or punctuation mark. After the USB3.1 device enters the protection identification mode, the identification information is inserted into the reserved bytes of the continuous TS2 training sequence to complete the marking of the device . The so-called marking the device means that after our USB3.1 device enters the protection identification mode, it has protection identification information in the reserved bytes of the TS2 training sequence, while other USB3.1 devices do not have this function, so that we can Effectively differentiate our equipment from other equipment. At this time, if a USB3.1 device does not enter the protection identification mode after meeting the trigger conditions, it means that the USB3.1 device does not use our IP soft core, and there is no infringement problem.
由于一个TS2训练序列只能携带一个字节的识别信息,因此,在一实施实例中,将标识信息逐字母地插入并周期性发送。保护识别信息可以包括IP授权的客户名称、授权的批次和时间等信息。例如,授权客户为A,授权批次为B,授权时间为C,则保护识别信息为ABC。在一个周期内发送三个TS2训练序列,发送的第一个TS2训练序列的保留字节所携带的保护识别信息为A,发送的第二个TS2训练序列的保留字节所携带的保护识别信息为B,发送的第三个TS2训练序列的保留字节所携带的保护识别信息为C,其中,A~C分别位于各个TS2训练序列的第5个字节中,且以ASCII码的形式存在,也即分别为:01000001、01000010、及01000011。Since a TS2 training sequence can only carry one byte of identification information, in an implementation example, the identification information is inserted letter by letter and sent periodically. Protected identification information can include information such as IP authorized client name, authorized batch and time. For example, if the authorized customer is A, the authorized batch is B, and the authorization time is C, the protection identification information is ABC. Three TS2 training sequences are sent in one cycle, the protection identification information carried in the reserved bytes of the first TS2 training sequence sent is A, and the protection identification information carried in the reserved bytes of the second TS2 training sequence sent It is B, and the protection identification information carried by the reserved bytes of the third TS2 training sequence sent is C, where A to C are respectively located in the 5th byte of each TS2 training sequence, and exist in the form of ASCII codes , namely: 01000001, 01000010, and 01000011, respectively.
在另一实施例中,于步骤S13之后,所述方法还包括:在重新上电或接收到由USB主机所发送的复位请求后,退出所述保护识别模式。In another embodiment, after step S13, the method further includes: exiting the protection identification mode after re-powering on or receiving a reset request sent by the USB host.
参阅图3,本实施例提供一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定方法,用于对前述方法实施例中的USB3.1设备的IP软核进行有效的侵权鉴定。所述方法由USB协议分析设备负责执行,该USB协议分析设备是指具有USB协议分析功能的电子设备,如USB协议分析仪等。所述方法具体包括如下步骤:Referring to FIG. 3 , this embodiment provides an IP soft core infringement identification method based on the USB3.1 protocol TS2 training sequence, which is used to effectively identify the IP soft core of the USB3.1 device in the foregoing method embodiment. The method is executed by a USB protocol analysis device, and the USB protocol analysis device refers to an electronic device with a USB protocol analysis function, such as a USB protocol analyzer and the like. The method specifically includes the following steps:
S31:捕获被测USB3.1设备于保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列。S31: Capture the TS2 training sequence sent to the USB host in the Polling.Configuration state and/or Recovery.Configuration state in the working state of the USB3.1 device under test in the protection identification mode.
被测USB3.1设备与USB主机通信连接,USB协议分析设备记录USB3.1接口上的行为,捕获被测USB3.1设备在保护识别模式下,于Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列。The USB3.1 device under test is connected to the USB host for communication, the USB protocol analysis device records the behavior on the USB3.1 interface, and captures the USB3.1 device under test in the protection identification mode, in Polling.Configuration state and/or Recovery.Configuration state TS2 training sequence sent to the USB host.
S32:提取所述TS2训练序列的保留字节中的保护识别信息。S32: Extract the protection identification information in the reserved bytes of the TS2 training sequence.
显然,若捕获的TS2训练序列的保留字节中不存在保护识别信息,则可认定被测USB3.1设备不是我们的设备,也就不存在侵权的问题。Obviously, if there is no protection identification information in the reserved bytes of the captured TS2 training sequence, it can be determined that the USB3.1 device under test is not our device, and there is no infringement problem.
S33:判断所述保护识别信息是否与预设保护识别信息相匹配;若否,则执行步骤S34;反之,则执行步骤S35。S33: Determine whether the protection identification information matches the preset protection identification information; if not, execute step S34; otherwise, execute step S35.
预设保护识别信息可以是预先设定的大、小写字母、数字或标点符号,还可以是由其中几种组合而成的字符串等。当提取的保护识别信息与预设保护识别信息相匹配,则说明该USB3.1设备是我们的产品。The preset protection identification information may be preset uppercase and lowercase letters, numbers, or punctuation marks, and may also be a character string formed by combining several of them. When the extracted protection identification information matches the preset protection identification information, it means that the USB3.1 device is our product.
S34:认定所述USB3.1设备侵权。S34: Determining that the USB3.1 device infringes.
S35:认定所述USB3.1设备不侵权。S35: Determine that the USB3.1 device is not infringing.
在一实施例中,步骤S31连续捕获一定时间或一定数量的TS2训练序列,步骤S32提取各所述TS2训练序列中的保护识别信息后采用ASCII码对其进行并译码,并将译码后的各所述保护识别信息依次排列,从而还原出授权客户名称、产品批次信息、和/或授权时间信息,步骤S33判断所述授权客户名称、产品批次信息、和/或授权时间信息是否与所述USB3.1设备的制造商的对应信息(也即名称、产品批次、和/或授权时间)相匹配,若不匹配,则认定被测USB3.1设备侵权。In one embodiment, step S31 continuously captures a certain time or a certain number of TS2 training sequences, and step S32 extracts the protection identification information in each of the TS2 training sequences and decodes it using ASCII code, and decodes the decoded data. Each of the protection identification information is arranged in sequence, so as to restore the authorized customer name, product batch information, and/or authorization time information, and step S33 judges whether the authorized customer name, product batch information, and/or authorization time information is It matches the corresponding information of the manufacturer of the USB 3.1 device (namely, the product batch, and/or the authorization time). If it does not match, it is determined that the USB 3.1 device under test is infringing.
参阅图4,本实施例提供另一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定方法,用于对前述方法实施例中的USB3.1设备的IP软核进行有效的侵权鉴定。所述方法由USB主机负责执行,该USB主机是指具有USB3.1接口的且能与USB3.1设备连接并通信的台式机、笔记本电脑等电子设备。所述方法具体包括如下步骤:Referring to FIG. 4 , this embodiment provides another IP soft core infringement identification method based on the USB3.1 protocol TS2 training sequence, which is used to effectively identify the IP soft core of the USB3.1 device in the foregoing method embodiment. The method is executed by a USB host, and the USB host refers to an electronic device such as a desktop computer, a notebook computer, etc., which has a USB3.1 interface and can be connected and communicated with a USB3.1 device. The method specifically includes the following steps:
S41:在Polling.Configuration状态和/或Recovery.Configuration状态下,向USB3.1设备发送保留字节中携带有特定信息的TS2训练序列,和/或,在U0状态下,向USB3.1设备发送携带有特定信息的用户测试链路管理数据包。S41: In the Polling.Configuration state and/or Recovery.Configuration state, send a TS2 training sequence with specific information in the reserved bytes to the USB3.1 device, and/or, in the U0 state, send to the USB3.1 device User test link management packets carrying specific information.
S42:查看所述USB3.1设备是否进入保护识别模式;若否,则执行步骤S43;反之,则可执行图3实施例中所述的方法,进而判断侵权情况。S42: Check whether the USB3.1 device enters the protection identification mode; if not, execute step S43; otherwise, execute the method described in the embodiment of FIG. 3, and then judge the infringement situation.
S43:认定所述USB3.1设备不是目标设备,也即被测USB3.1设备不是我们的产品,不存在侵权的问题。S43: It is determined that the USB3.1 device is not the target device, that is, the tested USB3.1 device is not our product, and there is no infringement problem.
参阅图5,与图1所示方法实施例原理相似的,本实施例提供一种基于USB3.1协议TS2训练序列的IP软核产权保护装置500,该装置作为软件产品搭载于USB3.1设备,以在运行时实现图1所示方法实施例中的全部或部分步骤。具体的,装置500包括如下模块:Referring to FIG. 5 , similar to the principle of the method embodiment shown in FIG. 1 , this embodiment provides an IP soft core property rights protection device 500 based on the USB3.1 protocol TS2 training sequence. The device is installed as a software product on a USB3.1 device. , so as to implement all or part of the steps in the method embodiment shown in FIG. 1 at runtime. Specifically, the apparatus 500 includes the following modules:
模式转换模块501用于检测是否满足预设的保护识别模式的触发条件;若是,则将当前工作状态切换至所述保护识别模式;进一步地,模式转换模块501还用于在检测到USB3.1设备重新上电或接收到由USB主机所发送的复位请求后,退出所述保护识别模式。The
序列发送模块502用于在所述保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机发送保留字节中携带有保护识别信息的TS2训练序列;进一步地,序列发送模块502还用于:周期性地发送保留字节中携带有保护信息的TS2训练序列;其中,周期内的各所述保护识别信息按时间先后顺序排列形成授权客户名称、产品批次信息、和/或授权时间信息。The sequence sending module 502 is configured to send the TS2 training sequence carrying the protection identification information in the reserved bytes to the USB host in the working state of the protection identification mode and in the Polling.Configuration state and/or the Recovery.Configuration state; further , the sequence sending module 502 is also used to: periodically send the TS2 training sequence carrying the protection information in the reserved bytes; wherein, the protection identification information in the period is arranged in chronological order to form the authorized customer name, product batch information, and/or authorization time information.
由于装置500的具体实施方式在原理上与图1方法的具体实施方式类似,所以于此不再展开赘述。Since the specific implementation of the apparatus 500 is similar in principle to the specific implementation of the method in FIG. 1 , detailed descriptions are omitted here.
参阅图6,与图3所示方法实施例原理相似的,本实施例提供一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定装置600,该装置作为软件产品搭载于USB3.1协议分析设备,以在运行时实现图3所示方法实施例中的全部或部分步骤。具体的,装置600包括如下模块:Referring to FIG. 6 , similar to the principle of the method embodiment shown in FIG. 3 , this embodiment provides an IP soft core infringement identification device 600 based on the TS2 training sequence of the USB3.1 protocol. The device, as a software product, is mounted on the USB3.1 protocol Analyzing the device to implement all or part of the steps in the method embodiment shown in FIG. 3 at runtime. Specifically, the apparatus 600 includes the following modules:
序列捕获模块601用于捕获被测USB3.1设备于保护识别模式的工作状态下,且在Polling.Configuration状态和/或Recovery.Configuration状态向USB主机所发送的TS2训练序列;进一步地,序列捕获模块601还用于:连续捕获一定时间或一定数量的所述TS2训练序列。The sequence capture module 601 is used to capture the TS2 training sequence sent to the USB host in the Polling.Configuration state and/or Recovery.Configuration state under the working state of the USB3.1 device under test in the protection identification mode; further, the sequence capture The module 601 is further configured to continuously capture a certain time or a certain number of the TS2 training sequences.
信息提取模块602用于提取所述TS2训练序列的保留字节中的保护识别信息;进一步地,信息提取模块602还用于:提取捕获的各所述TS2训练序列的保护识别信息,并将各所述保护识别信息按时间先后顺序排列以还原授权客户名称、产品批次信息、和/或授权时间信息;进一步地,信息提取模块602还用于:采用ASCII码对各所述保护识别信息进行译码;将译码后的各所述保护识别信息按时间先后顺序排列。The information extraction module 602 is configured to extract the protection identification information in the reserved bytes of the TS2 training sequence; further, the information extraction module 602 is further configured to: extract the captured protection identification information of each of the TS2 training sequences, and extract the protection identification information of each of the TS2 training sequences. The protection identification information is arranged in chronological order to restore the authorized customer name, product batch information, and/or authorization time information; further, the information extraction module 602 is also used for: using ASCII code to perform the operation of each protection identification information. Decoding: Arranging the decoded protection identification information in chronological order.
侵权鉴定模块603用于判断所述保护识别信息是否与预设保护识别信息相匹配;若否,则认定所述USB3.1设备侵权;进一步地,侵权鉴定模块603还用于:若所述TS2训练序列的保留字节中不存在所述保护识别信息,则认定所述USB3.1设备不是目标设备;或者,进一步地,侵权鉴定模块603还用于:判断所述授权客户名称、产品批次信息、和/或授权时间信息是否与所述USB3.1设备的制造商的对应信息相匹配,若否,则认定所述USB3.1设备侵权。The infringement identification module 603 is used for judging whether the protection identification information matches the preset protection identification information; if not, it is determined that the USB3.1 device infringes; further, the infringement identification module 603 is further used for: if the TS2 If the protection identification information does not exist in the reserved bytes of the training sequence, it is determined that the USB3.1 device is not a target device; or, further, the infringement identification module 603 is further configured to: determine the authorized customer name, product batch Whether the information and/or authorization time information matches the corresponding information of the manufacturer of the USB3.1 device, if not, it is determined that the USB3.1 device is infringing.
由于装置600的具体实施方式在原理上与图3方法的具体实施方式类似,所以于此不再展开赘述。Since the specific implementation of the apparatus 600 is similar in principle to the specific implementation of the method in FIG. 3 , detailed descriptions are omitted here.
参阅图7,与图4所示方法实施例原理相似的,本实施例提供另一种基于USB3.1协议TS2训练序列的IP软核侵权鉴定装置700,该装置作为软件产品搭载于USB主机,以在运行时实现图4所示方法实施例中的全部或部分步骤。具体的,装置700包括如下模块:Referring to FIG. 7 , similar to the principle of the method embodiment shown in FIG. 4 , this embodiment provides another IP soft core infringement identification device 700 based on the USB3.1 protocol TS2 training sequence. The device is mounted on a USB host as a software product. All or part of the steps in the method embodiment shown in FIG. 4 are implemented at runtime. Specifically, the apparatus 700 includes the following modules:
序列发送模块701用于在Polling.Configuration状态和/或Recovery.Configuration状态下向USB3.1设备发送保留字节中携带有特定信息的TS2训练序列;和/或用于在U0状态下向USB3.1设备发送携带有特定信息的用户测试链路管理数据包。The
侵权鉴定模块702用于查看所述USB3.1设备是否进入保护识别模式;若否,则认定所述USB3.1设备不是目标设备;进一步地,若是,则连接并跳转至装置600的序列捕获模块601。The infringement identification module 702 is used to check whether the USB3.1 device enters the protection identification mode; if not, it is determined that the USB3.1 device is not the target device; further, if so, connect and jump to the sequence capture of the device 600 Module 601.
由于装置700的具体实施方式在原理上与图4方法的具体实施方式类似,所以于此不再展开赘述。Since the specific implementation of the apparatus 700 is similar in principle to the specific implementation of the method in FIG. 4 , it will not be repeated here.
本领域技术人员应当理解,图5~图7实施例中的各个模块的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个或多个物理实体上。且这些模块可以全部以软件通过处理元件调用的形式实现,也可以全部以硬件的形式实现,还可以部分模块通过处理元件调用软件的形式实现,部分模块通过硬件的形式实现。例如,模式转换模块501可以为单独设立的处理元件,也可以集成在某一个芯片中实现,此外,也可以以程序代码的形式存储于存储器中,由某一个处理元件调用并执行模式转换模块501的功能。其它模块的实现与之类似。这里所述的处理元件可以是一种集成电路,具有信号的处理能力。在实现过程中,上述方法的各步骤或以上各个模块可以通过处理器元件中的硬件的集成逻辑电路或者软件形式的指令完成。Those skilled in the art should understand that the division of each module in the embodiments of FIG. 5 to FIG. 7 is only a division of logical functions, and may be fully or partially integrated into one or more physical entities in actual implementation. And these modules can all be implemented in the form of software calling through processing elements, or all of them can be implemented in hardware, and some modules can be implemented in the form of calling software through processing elements, and some modules can be implemented in hardware. For example, the
本领域普通技术人员可以理解,实现上述各方法实施例的全部或部分步骤可以通过计算机程序相关的硬件来完成。基于这样的理解,本发明还提供一种计算机程序产品,包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(如:同轴电缆、光纤、数字用户线(DSL))或无线(如:红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(如:软盘、硬盘、磁带)、光介质(如:DVD)、或者半导体介质(如:固态硬盘Solid StateDisk(SSD))等。Those of ordinary skill in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by hardware related to computer programs. Based on this understanding, the present invention also provides a computer program product comprising one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server or data center by wired (eg coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg: infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be stored by a computer, or a data storage device such as a server, data center, etc., which includes one or more available media integrated. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (eg, a Solid State Disk (SSD)), and the like.
参见图8,本实施例提供一种电子设备,例如:USB3.1设备、USB主机、USB协议分析仪等,其包括通过总线81连接的:通信器82、处理器83、及存储器84,其中,通信器82用于实现电子设备与外部设备的信息传输,存储器83用于存储计算机程序,处理器84用于执行存储器83存储的计算机程序,以使该电子设备执行前述任一方法实施例中的步骤。Referring to FIG. 8 , this embodiment provides an electronic device, such as a USB3.1 device, a USB host, a USB protocol analyzer, etc., which includes a
上述提到的系统总线可以是外设部件互连标准(PeripheralPomponentInterconnect,简称PCI)总线或扩展工业标准结构(ExtendedIndustryStandardArchitecture,简称EISA)总线等。该系统总线可以分为地址总线、数据总线、控制总线等。为便于表示,图中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。通信接口用于实现数据库访问装置与其他设备(例如客户端、读写库和只读库)之间的通信。存储器可能包含随机存取存储器(RandomAccessMemory,简称RAM),也可能还包括非易失性存储器(non-volatilememory),例如至少一个磁盘存储器。The system bus mentioned above may be a Peripheral Pomponent Interconnect (PCI for short) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA for short) bus or the like. The system bus can be divided into address bus, data bus, control bus and so on. For ease of presentation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus. The communication interface is used to realize the communication between the database access device and other devices (eg client, read-write library and read-only library). The memory may include random access memory (Random Access Memory, RAM for short), and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
上述的处理器可以是通用处理器,包括中央处理器(CentralProcessingUnit,简称CPU)、网络处理器(NetworkProcessor,简称NP)等;还可以是数字信号处理器(DigitalSignalProcessing,简称DSP)、专用集成电路(ApplicationSpecificIntegratedCircuit,简称ASIC)、现场可编程门阵列(Field-ProgrammableGateArray,简称FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。The above-mentioned processor can be a general-purpose processor, including a central processing unit (CentralProcessingUnit, referred to as CPU), a network processor (NetworkProcessor, referred to as NP), etc.; can also be a digital signal processor (DigitalSignalProcessing, referred to as DSP), application-specific integrated circuit ( ApplicationSpecificIntegratedCircuit, referred to as ASIC), field programmable gate array (Field-ProgrammableGateArray, referred to as FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
综上所述,本发明的基于USB3.1协议TS2训练序列的IP软核产权保护与侵权鉴定方法,采用与USB3.1协议深度绑定的方式,有效地实现了对USB3.1软核的知识产权保护与鉴定,有效克服了现有技术中的种种缺点而具高度产业利用价值。To sum up, the IP soft core property rights protection and infringement identification method based on the TS2 training sequence of the USB3.1 protocol of the present invention adopts the method of deep binding with the USB3.1 protocol, and effectively realizes the protection of the USB3.1 soft core. The protection and identification of intellectual property rights effectively overcome various shortcomings in the existing technology and have high industrial utilization value.
上述实施例仅例示性说明本发明的原理及其功效,而非用于限制本发明。任何熟悉此技术的人士皆可在不违背本发明的精神及范畴下,对上述实施例进行修饰或改变。因此,举凡所属技术领域中具有通常知识者在未脱离本发明所揭示的精神与技术思想下所完成的一切等效修饰或改变,仍应由本发明的权利要求所涵盖。The above-mentioned embodiments merely illustrate the principles and effects of the present invention, but are not intended to limit the present invention. Anyone skilled in the art can modify or change the above embodiments without departing from the spirit and scope of the present invention. Therefore, all equivalent modifications or changes made by those with ordinary knowledge in the technical field without departing from the spirit and technical idea disclosed in the present invention should still be covered by the claims of the present invention.
Claims (16)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810651407.9A CN109145527B (en) | 2018-06-22 | 2018-06-22 | IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810651407.9A CN109145527B (en) | 2018-06-22 | 2018-06-22 | IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN109145527A CN109145527A (en) | 2019-01-04 |
| CN109145527B true CN109145527B (en) | 2020-10-09 |
Family
ID=64802228
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810651407.9A Active CN109145527B (en) | 2018-06-22 | 2018-06-22 | IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109145527B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110018977A (en) * | 2019-03-20 | 2019-07-16 | 芯启源(上海)半导体科技有限公司 | Infringement recognition methods, system, terminal and medium based on usb protocol |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1438593A (en) * | 2003-01-15 | 2003-08-27 | 西安交通大学 | Design method for specific chip of intelligent electric appliance |
| TWI295133B (en) * | 2005-11-04 | 2008-03-21 | Univ Nat Taiwan | |
| CN104615952A (en) * | 2014-12-22 | 2015-05-13 | 天津大学 | IP hard core intellectual property protection method and device based on path delay |
| CN107679008A (en) * | 2017-10-17 | 2018-02-09 | 郑州云海信息技术有限公司 | A kind of IP kernel for optimizing user interface and the method for optimizing IP user's interface |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8402401B2 (en) * | 2009-11-09 | 2013-03-19 | Case Western University | Protection of intellectual property cores through a design flow |
| US10528421B2 (en) * | 2015-12-29 | 2020-01-07 | Arteris, Inc. | Protection scheme conversion |
-
2018
- 2018-06-22 CN CN201810651407.9A patent/CN109145527B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1438593A (en) * | 2003-01-15 | 2003-08-27 | 西安交通大学 | Design method for specific chip of intelligent electric appliance |
| TWI295133B (en) * | 2005-11-04 | 2008-03-21 | Univ Nat Taiwan | |
| CN104615952A (en) * | 2014-12-22 | 2015-05-13 | 天津大学 | IP hard core intellectual property protection method and device based on path delay |
| CN107679008A (en) * | 2017-10-17 | 2018-02-09 | 郑州云海信息技术有限公司 | A kind of IP kernel for optimizing user interface and the method for optimizing IP user's interface |
Also Published As
| Publication number | Publication date |
|---|---|
| CN109145527A (en) | 2019-01-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9411990B2 (en) | Working method of a multi-slot card reader based on the standard CCID protocol | |
| US8725909B2 (en) | Method for identifying host operating system by universal serial bus (USB) device | |
| CN108475245B (en) | Plug and play device identification method and electronic device | |
| US20080270780A1 (en) | Design structure for disabling a universal serial bus port | |
| CN105740718B (en) | Electronic system, electronic device and access authentication method of electronic device | |
| CN101996121A (en) | Universal serial bus (USB) port testing device and testing method | |
| CN109214144B (en) | IP soft core property protection and infringement identification method based on USB3.2 protocol TS2 training sequence | |
| CN109102436B (en) | IP soft core property protection and infringement identification method based on USB3.0 protocol TS1 training sequence | |
| WO2017161750A1 (en) | Mobile apparatus | |
| CN102053900A (en) | Method and system for testing USB (Universal Serial Bus) equipment of electronic device | |
| CN110851334A (en) | Flow statistical method, electronic device, system and medium | |
| US20050114571A1 (en) | System and method for communication of keyboard and touchpad inputs as HID packets embedded on a SMBus | |
| CN109145527B (en) | IP soft core property protection and infringement identification method based on USB3.1 protocol TS2 training sequence | |
| CN109165482B (en) | IP soft core property protection and infringement identification method based on USB3.1 protocol TS1 training sequence | |
| CN109214143B (en) | IP soft core property protection and infringement identification method based on USB3.2 protocol TS1 training sequence | |
| CN109165481B (en) | IP soft core property rights protection and infringement identification method based on USB3.0 protocol TS2 training sequence | |
| WO2020206879A1 (en) | Method and device for automatically adapting link width of pcie port, electronic apparatus and storage medium | |
| CN110018977A (en) | Infringement recognition methods, system, terminal and medium based on usb protocol | |
| CN101364198A (en) | Test fixture and test method for card reading interface | |
| CN101706758B (en) | Identification method of multiple sets of PCI equipment with same hardware configuration under Windows system | |
| CN100386751C (en) | Method and device for automatic initialization of USB equipment | |
| CN115202977A (en) | Chip running state monitoring method, system and chip | |
| CN100419704C (en) | External device extension interface test method | |
| US7509439B2 (en) | Method for maintaining register integrity and receive packet protection during ULPI PHY to LINK bus transactions | |
| CN110795377A (en) | Method, device and computer, equipment, medium and product for hot-plugging of chips |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
| PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: IP Soft Core Property Protection and Infringement Identification Method Based on USB3.1 Protocol TS2 Training Sequence Granted publication date: 20201009 Pledgee: Ningbo Yinsheng Investment Co.,Ltd. Pledgor: XINQIYUAN (SHANGHAI) SEMICONDUCTOR TECHNOLOGY Co.,Ltd. Registration number: Y2024980014581 |
|
| PC01 | Cancellation of the registration of the contract for pledge of patent right | ||
| PC01 | Cancellation of the registration of the contract for pledge of patent right |
Granted publication date: 20201009 Pledgee: Ningbo Yinsheng Investment Co.,Ltd. Pledgor: XINQIYUAN (SHANGHAI) SEMICONDUCTOR TECHNOLOGY Co.,Ltd. Registration number: Y2024980014581 |
|
| CP03 | Change of name, title or address | ||
| CP03 | Change of name, title or address |
Address after: 201203 Shanghai Pudong New Area Zhangdong Road 1388, Tech Leader's Capital Building 01 Patentee after: Shanghai Corepilot Semiconductor Co.,Ltd. Country or region after: China Address before: Room A669-18, Building 2, No. 351 Guoshoujing Road, Pudong New Area Pilot Free Trade Zone, Shanghai Patentee before: XINQIYUAN (SHANGHAI) SEMICONDUCTOR TECHNOLOGY Co.,Ltd. Country or region before: China |