Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/72
G06F-021/12
G06F-021/85
G06F-009/44
출원번호
US-0152877
(2014-01-10)
등록번호
US-9208356
(2015-12-08)
우선권정보
JP-2002-258481 (2002-09-04)
발명자
/ 주소
Fujiwara, Makoto
Nemoto, Yusuke
Yasui, Junichi
Maeda, Takuji
Ito, Takayuki
Yamada, Yasushi
Inoue, Shinji
출원인 / 주소
PANASONIC CORPORATION
대리인 / 주소
McDermott Will & Emery LLP
인용정보
피인용 횟수 :
0인용 특허 :
16
초록▼
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an external memory 100. In the encryption section 2, the operation of a private key arithmetic processing section 20 is prohibited with respect t
A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an external memory 100. In the encryption section 2, the operation of a private key arithmetic processing section 20 is prohibited with respect to a sequence whose execution is determined by a key-generation/update sequencer 30 to be impermissible. In the external I/F 50, a program processing section 51 and a data processing section 55 are structured independently from each other.
대표청구항▼
1. A semiconductor device comprising: a key storage section for storing a key in an unrewritable state;an interface section for processing a multimedia content; anda program verification section for verifying a validity of a first program before execution of the first program, wherein:the key is use
1. A semiconductor device comprising: a key storage section for storing a key in an unrewritable state;an interface section for processing a multimedia content; anda program verification section for verifying a validity of a first program before execution of the first program, wherein:the key is used while the program verification section is verifying the validity of the first program,the multimedia content is protected in confidence when the multimedia content is not reproduced, andthe multimedia content is reproduced by using a protected program. 2. The semiconductor device of claim 1, further comprising: a ROM for storing a second program; anda mode ID storage section for storing a mode ID, the mode ID indicating as a current operation mode, a first mode or a second mode, wherein:a sequence of the second program is controlled in accordance with the current operation mode indicated by the mode ID stored in the mode ID storage section, andwhen the mode ID indicates the second mode, the first program is executable, while when the mode ID indicates the first mode, the first program is executed only if the validity of the first program is verified by the program verification section. 3. The semiconductor device of claim 2, wherein the second program reads the first program the validity of which is verified by the program verification section into the semiconductor device. 4. The semiconductor device of claim 2, wherein the mode ID storage section stores the mode ID in an unrewritable state. 5. The semiconductor device of claim 4, further comprising a flag for controlling whether rewriting of the mode ID storage section is permitted or not, wherein, when the mode ID is written into the mode ID storage section, a predetermined value is set at the flag and the mode ID storage section becomes in the unrewritable state. 6. The semiconductor device of claim 2, further comprising a mode ID storage register, wherein the mode ID stored in the mode ID storage section is set at the mode ID storage register after the semiconductor device is powered on. 7. The semiconductor device of claim 6, wherein: the second program has a first sequence common to operation modes and a second sequence different at every operation mode, andat the first sequence, the mode ID is set at the mode ID storage register. 8. The semiconductor device of claim 2, further comprising a key processing section for storing a parameter required for decrypting program or data at the first mode, wherein the second program sets the parameter at the key processing section. 9. The semiconductor device of claim 2, wherein the program verification section calculates a HASH value of the first program and compares the calculated HASH value with a prestored HASH value to verify the validity of the first program. 10. The semiconductor device of claim 2, wherein at the first mode, the first program is stored in an external memory in an encrypted state with an inherent key unique to the semiconductor device. 11. The semiconductor device of claim 2, wherein, when the mode ID indicates the second mode, the program verification section doesn't verify the validity of the first program. 12. The semiconductor device of claim 2, further comprising a key storage register for storing a key, wherein the key stored in the key storage section is set at the key storage register after the semiconductor device is powered on. 13. The semiconductor device of claim 2, further comprising a register for storing a security information, wherein the security information includes:an inherent key which is unique to the semiconductor device;a common key which is not unique to the semiconductor device; andan inherent ID which is unique to the semiconductor device. 14. The semiconductor device of claim 13, wherein at least a part of security information is originally stored in an unrewritable area of the semiconductor device, and set in the register for storing security information only once after initialization. 15. The semiconductor device of claim 1, further comprising: a cryptography processing section for processing a cryptography processing,wherein a protected content is converted into an unprotected content by the cryptography processing section. 16. The semiconductor device of claim 1, further comprising: a hash calculation section for calculating a hash value. 17. The semiconductor device of claim 1, further comprising: a random number generation section for generating a random number. 18. The semiconductor device of claim 1, further comprising: a ROM for storing a second program. 19. The semiconductor device of claim 1, wherein the key is accessible in a limited way. 20. The semiconductor device of claim 1, wherein the first program is stored in an external memory. 21. The semiconductor device of claim 1, further comprising a boot program. 22. The semiconductor device of claim 21, further comprising a memory for storing the boot program. 23. The semiconductor device of claim 21, wherein the boot program controls loading of applications on the semiconductor device during boot-up. 24. The semiconductor device of claim 1, further comprising a secure flash loader. 25. The semiconductor device of claim 24, further comprising a memory for storing the secure flash loader. 26. The semiconductor device of claim 1, further comprising a tampering detection section for determining whether tampering has occurred with respect to the first program. 27. The semiconductor device of claim 1, further comprising a secure RAM. 28. The semiconductor device of claim 27, wherein the secure RAM controls content stored within the secure RAM that can be reproduced. 29. The semiconductor device of claim 1, further comprising a secure internal communication system for communicating data within the semiconductor device. 30. The semiconductor device of claim 29, wherein the secure internal communication system is a private bus. 31. The semiconductor device of claim 29, wherein the secure internal communication system is accessible only by internal components of the semiconductor device. 32. The semiconductor device of claim 1, further comprising a program processing section for communicating with an external program. 33. A semiconductor device comprising: a hash calculation section for calculating a hash value;an interface section for processing a multimedia content; anda program verification section for verifying a validity of a first program before execution of the first program, wherein:the hash value is used while the program verification section is verifying the validity of the first program,the multimedia content is protected in confidence when the multimedia content is not reproduced, andthe multimedia content is reproduced by using a protected program. 34. The semiconductor device of claim 33, further comprising a boot program. 35. The semiconductor device of claim 34, further comprising a memory for storing the boot program. 36. The semiconductor device of claim 34, wherein the boot program controls loading of applications on the semiconductor device during boot-up. 37. The semiconductor device of claim 33, further comprising a secure flash loader. 38. The semiconductor device of claim 37, further comprising a memory for storing the secure flash loader. 39. The semiconductor device of claim 33, further comprising a tampering detection section for determining whether tampering has occurred with respect to the first program. 40. The semiconductor device of claim 33, further comprising a secure RAM. 41. The semiconductor device of claim 40, wherein the secure RAM controls content stored within the secure RAM that can be reproduced. 42. The semiconductor device of claim 33, further comprising a secure internal communication system for communicating data within the semiconductor device. 43. The semiconductor device of claim 42, wherein the secure internal communication system is a private bus. 44. The semiconductor device of claim 42, wherein the secure internal communication system is accessible only by internal components of the semiconductor device. 45. The semiconductor device of claim 33, further comprising a program processing section for communicating with an external program.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.