The disclosure relates in general to a semiconductor package, an operating method of the semiconductor package and a chip, and more particularly to a multi-chip package, a controlling method of the multi-chip package and a security chip.
Along with the development of memory, various memories are invented. For example, Flash, ReRAM, EPROM, PCM can be used for different applications.
Those memories can be used to store digital data. Those digital data is easily to read or transmit. Some security information may be stolen by other people. Therefore, how to ensure the information security is an important issue nowadays.
The disclosure is directed to a multi-chip package, a controlling method of the multi-chip package and a security chip. The security chip and a memory chip are packed to be the multi-chip package. A security path can be controlled to be enabled for executing a security procedure. A control path can be controlled to be enabled for passing a control signal to the memory chip if the security procedure is successfully performed. As such, the security chip can ensure the information security of the memory chip, and the memory chip can provide extra data region for the security chip to execute the security procedure.
According to one embodiment, a controlling method of a multi-chip package is provided. The multi-chip package includes a memory chip and a security chip. The controlling method includes the following steps: A command is received from a host by a processing circuit of the security chip. A security path is enabled to input an input-output signal into the processing circuit for executing a security procedure and accessing the memory chip, if the command includes a security requirement.
According to another embodiment, a multi-chip package is provided. The multi-chip package includes a memory chip and a security chip. The security chip is coupled between the memory chip and a host. The security chip includes a processing circuit. The processing circuit is for enabling a security path to input an input-output signal into the processing circuit for executing a security procedure and accessing the memory chip, if a command is received by the processing circuit and the command includes a security requirement.
According to an alternative embodiment, a security chip is provided. The security chip includes a processing circuit. The processing circuit is for enabling a security path to input an input-output signal into the processing circuit for executing a security procedure and accessing a memory chip, if a command is received from a host by the processing circuit and the command includes a security requirement.
In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosed embodiments. It will be apparent, however, that one or more embodiments may be practiced without these specific details. In other instances, well-known structures and devices are schematically shown in order to simplify the drawing.
Refer to
The input-output pin PN11 and the control pin PN12 are used to connect an input-output pin PN21 and a control pin PN22 of the host 200 respectively. The security chip 120 is coupled between the memory chip 110 and the host 200. When the host 200 accesses the data in the memory chip 110, the security chip 120 manages the accessing operation and executes the security procedure if the security is required.
The security chip 120 includes a processing circuit 121, a first switch 122, a second switch 123, a first input-output pad P11, a second input-output pad P12, a first control pad P21 and a second control pad P22. The first input-output pad P11 is coupled to the input-output pin PN11, and the second input-output pad P12 is coupled to a third input-output pad P13 of the memory chip 110. The first control pad P21 is coupled to the control pin PN12, and the second control pad P22 is coupled to a third control pad P23 of the memory chip 110. The third input-output pad P13 of the memory chip 110 is not directly coupled to the input-output pin PN11, and the third control pad P23 of the memory chip 110 is not directly coupled to the control pin PN12.
To access the data storing in the memory chip 110, there are several paths formed from the host 200 to the memory chip 110. The security chip 120 can manage those paths to access the data with security function or access the data without security function.
The memory chip 110 and the security chip 120 may be arranged in different way. For example, please refer to
In this embodiment, the security chip 120 can manage those paths to access the data with security function or access the data without security function also. For detail illustrating the operation of the memory chip 110 and the security chip 120, a controlling method of the multi-chip package 100, 100′ is illustrated via a flowchart.
Please refer to
In step S120, the processing circuit 121 determines whether the command CM includes a security requirement. The command CM is decoded by the processing circuit 121 to know whether the command CM includes the security requirement or not. For example, the security requirement may be the authentication requirement, the encryption requirement or the decryption requirement. If the command CM includes the security requirement, then the process proceeds to step S130; if the command CM does not include the security requirement, then the process proceeds to step S140.
In step S130, referring to
In step S150, the processing circuit 121 determines whether the security procedure is successfully performed. If the security procedure is successfully performed, then the process proceeds to step S160; if the security procedure is not successfully performed, then the process proceeds to step S170.
In step S160, referring to
In step S170, referring to
In step S140, referring to
According to the embodiments described above, the security chip 120 can ensure the information security of the memory chip 110, and the memory chip 110 can provide extra data region for the security chip 120 to execute the security procedure.
It will be apparent to those skilled in the art that various modifications and variations can be made to the disclosed embodiments. It is intended that the specification and examples be considered as exemplary only, with a true scope of the disclosure being indicated by the following claims and their equivalents.
Number | Name | Date | Kind |
---|---|---|---|
10129035 | Gulati et al. | Nov 2018 | B2 |
20050144468 | Northcutt | Jun 2005 | A1 |
20100031059 | Laackmann | Feb 2010 | A1 |
20120036351 | Peet, Jr. | Feb 2012 | A1 |
20120110246 | Rolandi | May 2012 | A1 |
20130016832 | Yamashita | Jan 2013 | A1 |
20130031375 | Lin | Jan 2013 | A1 |
20150012737 | Newell | Jan 2015 | A1 |
20170256187 | Zhang | Sep 2017 | A1 |
20190036706 | Detert | Jan 2019 | A1 |
Number | Date | Country |
---|---|---|
M467123 | Dec 2013 | TW |
201717092 | May 2017 | TW |
201738738 | Nov 2017 | TW |
Entry |
---|
TW Office Action dated Oct. 28, 2019 in Taiwan application (107128495). |
TIPO Office Action dated Mar. 27, 2019 in Taiwan application (No. 107128495). |
Number | Date | Country | |
---|---|---|---|
20200057575 A1 | Feb 2020 | US |