SPINTROL chip security technology

发布时间:2021-11-29

In the fierce market competition, driven by profits, the phenomenon of product copycats has been repeatedly banned. This is a serious challenge for regular manufacturers who invest heavily in research and development of products. Therefore, the safety of products has received more and more attention. As the core component of a product, once the chip is stolen, the entire product will face the risk of being cracked. This article will introduce the security technology adopted by Spintrol’s latest generation of chips, and how to protect the chip program in an all-round way during the burning process to achieve product safety production.

1.Secure Boot

In the actual product mass production process, the distribution process of burned files is an important source of chip security risks. Burning files is the wisdom crystallization of product development, and its safety is particularly important. In the product production factory, the production personnel are mixed, and if the burned file is directly distributed to the factory, it is easy to cause the leakage of the file content.

In this regard, Spintrol’s latest generation of chips embedded Secure Boot function. Secure Boot allows the program to be burned into the chip in the form of cipher text. Therefore, users can use the encryption tool provided by Spintrol to encrypt the burned file data first, and then send the burned file to the production factory in the form of cipher text. This not only solves the risk of factory leakage of documents, but also reduces factory-related safety control measures, reduces factory costs, and improves production efficiency.

Next, the staff can use the programming device to burn the file data (encrypted) into the chip. After the chip programming is completed, Secure Boot can decrypt the encrypted data and then write it back to the chip, so that the chip can be run directly. The entire decryption process is completed inside the chip, which greatly reduces the risk of original data leakage and enhances security.

 

 

2. Debug interface lock

We know that in order to facilitate the debugging of the chip (Debug), the chip generally has a Debug interface. Through the Debug interface, not only can write data to the chip, but also can read data from the chip. This also means that the data burned into the chip can also be completely read out through the Debug interface, causing the contents of the burned file to be indirectly stolen. Spintrol took this problem into consideration when designing the chip. It only needs to enable the encryption mechanism of the chip in time after the programming is completed. When the chip is removed, the encryption will take effect immediately, and the Debug interface will be locked, thus prohibiting external devices from accessing the chip’s internal data through the Debug interface. In this way, the security of code data can be guaranteed to a certain extent.

 

The above security protection technology can provide a full range of protection for the user’s program data from the R&D end to the factory chip end, which is safe and reliable.

2020 官网升级中!现在您访问官网的浏览器设备分辨率宽度低于1200px
请使用高分辨率宽度访问。