摘要:
A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
摘要:
A DMA controller is connected by a bus to a plurality of master devices and a plurality of slave devices, and performs a data transfer between slave devices which are specified as a source and a destination of the data transfer by a transfer condition received from any of the plurality of master devices. Each of the plurality of master devices and the plurality of slave devices has a rank used for judging data transfer permissibility. The DMA controller enables the data transfer if the data transfer is judged to be permitted as a result of a comparison between a rank of the master device and a rank of any of the specified slave devices, and disables the data transfer if the data transfer is judged to be prohibited.
摘要:
To provide an aperture mechanism and an optical apparatus which are reduced in size. The aperture mechanism comprising: a driving member to be driven in accordance with an aperture operation; an aperture member having an aperture to be driven by the driving member; a first engagement section connected to one of the driving member and the aperture member; a second engagement section connected to another one of the driving member and the aperture member and engaged with the first engagement section; and a biasing member connected to at least one of the driving member and the aperture member to provide a bias in a direction in which the first engagement section and the second engagement section are facing to each other.
摘要:
A domain key is used to perform chaining decryption with respect to encrypted content key information (ST203-1), and first data is extracted (ST203-2). The extracted first data is compared with partial-check data (ST203-4). The first data as it is encrypted is extracted from the m pieces of encrypted content key information (ST203-6), and a predetermined operation is executed with respect to concatenated data including m extracted check values to generate second data (ST203-8). The second data is compared with whole-check data included in domain key information (ST203-11). If the first data matches the partial-check data (ST203-5) and the second data matches the whole-check data (ST203-12), it is determined that there is not tampering.
摘要:
In a seal chain, a seal mechanism disposed between opposed surfaces of inner and outer link plates comprises an elastic ring, a seal ring adhered to the outer link plate, an annular resin seal having a base adhered to the inner link plate, a tongue on the annular resin seal in abutting relationship with the outer link plate, and a ring-shaped plate adhered to the outer link plate. The elastic ring is held between an inclined surface formed on an end of a bushing that protrudes past the inner link plate, and an inclined inner surface of the seal ring. The inner circumferential surface of base of the annular resin seal slides on the outer circumferential surface of the seal ring.
摘要:
A first LSI moves to an energy saving state after saving the header analysis result from a header information analysis unit in a header analysis result storage unit. While the first LSI is in the energy-saving state, a second LSI reads and plays back audio data that is stored in a memory device based on the header analysis result that is saved in the header analysis result storage unit.
摘要:
An encryption process is employed in the LSI design so as to improve confidentiality of the circuit design data over conventional examples. In the encryption process, confidential circuit design data is encrypted to produce encrypted design data and a cipher key. The encrypted design data is provided to the user who conducts a design/verification process. The key is also provided as required. In the design/verification process, the encrypted design data is subjected to various processes without disclosing the contents of the original circuit. In a decoding process, the encrypted design data subjected to the design/verification process is decoded to produce original circuit design data.
摘要:
A secret information processing apparatus including: a control unit 102 storing access control levels assigned to resources in the apparatus and used as a standard in judging whether to permit an access to any resource from any external apparatus; a secret information storage unit 105 storing an update target program; and an internal CPU 103 that performs an update process for updating the update target program if an update request is received. The control unit 102 determines whether to permit accesses to the resources from the external apparatus, in accordance with the access control levels. The internal CPU 103 changes, during the update process, access control levels of resources, which are to be accessed by the update unit during the update process and whose access control levels indicate that accesses are permitted, to levels indicating that accesses are not permitted.
摘要:
In an LSI, a decoding section decodes an ID signal received externally and outputs the decoded signal. A fuse circuit writes the value represented by the decoded signal therein when an operation setting signal is active, and holds the written value when the operation setting signal is inactive. An ID RAM stores the value held in the fuse circuit as the ID. This enables installation of IDs of various values in LSIs only by changing the value of the ID signal.
摘要翻译:在LSI中,解码部对从外部接收的ID信号进行解码,并输出解码信号。 当操作设置信号有效时,熔丝电路将解码信号表示的值写入其中,并且当操作设置信号无效时保持写入值。 ID RAM将保存在熔丝电路中的值作为ID存储。 这样可以通过改变ID信号的值来在LSI中安装各种ID的ID。
摘要:
A check computation circuit executes a computation corresponding to a computation for generating confidential CRC data, with respect to confidential data read from a non-volatile device. A comparison circuit compares the result of the computation in the check computation circuit with confidential CRC data read from the non-volatile device. When the result of the comparison indicates a mismatch, i.e., an error is detected, an encryption circuit encrypts the confidential data and the confidential CRC data using a secret key registered in a secret key register, and outputs the encrypted confidential data and confidential CRC data to the outside of a semiconductor integrated circuit.