Precision PCB Fabrication, High-Frequency PCB, High-Speed PCB, Standard PCB, Multilayer PCB and PCB Assembly.
The most reliable PCB & PCBA custom service factory.
PCB Technical

PCB Technical - PCB file format and encryption chip to prevent PCB copy board

PCB Technical

PCB Technical - PCB file format and encryption chip to prevent PCB copy board

PCB file format and encryption chip to prevent PCB copy board

2021-11-10
View:824
Author:Downs

This article introduces the three common encryption chips for judging the file format from the PCB file suffix and preventing PCB copying.

Judge the file format from the PCB file suffix

Many friends often encounter PCB design files of various formats in the process of work. This article summarizes the corresponding formats of the file suffixes. I hope it will be helpful to everyone.

1. PCB. The most common suffix, many PCB design files are this suffix, the most common of which are Protel, PADS, in addition to ZUKEN's Cadstar, CR5000, Altimum's P-CAD, etc.

2.brd. Cadence Allegro, Eagle.

3.max. Another PCB design software ORCAD of Cadence Company.

4.min. The text file output by ORCAD.

5. PCBdoc. Designed by the new version of Protel DXP and AD6.

6.asc. The text format of some PCB software,such as PADS,protel,P-cad,etc.

pcb board

7.dat, .neu, .net, etc. Netrual file generated by Mentor.

8. It is composed of many folders. One of them is centlib (central library), a mentor expedition design file.

9.cam. CAM350 or Camtastic 2000 files.

10.tgz. ODB++ files generated by PCB design files.

11.cad. Gencad file generated by PCB design file.


Three common encryption chips to prevent PCB copying

In the fiercely competitive electronic and information technology product industry, encryption chips are becoming more and more important for certain products with higher development costs to prevent peer copying.Here are three common encryption chips


Solution 1:PCB copy board logic encryption chip

Chip structure:EEPROM + logic circuit

Copyright protection scheme: password authentication, symmetric algorithm authentication

Advantages:low cost, simple peripheral circuit, simple development

Disadvantages:low security and easy to crack


Option 2:Transplant encryption chip based on algorithm

Chip structure: high-security financial-grade encryption chip

Copyright protection scheme:

1.The main solution: algorithm transplantation, transplanting part of the MCU program to the encryption chip to run

2.Auxiliary scheme: symmetric algorithm authentication

Advantages:high security, MCU can not bypass the encryption chip to run independently.

Disadvantages: high cost, increased user workload, users need to develop security chip programs,and a download program environment needs to be set up during mass production.


Scheme 3:Encryption chip based on PKI authentication system

Chip structure: high-security financial-grade encryption chip


Copyright protection scheme:

1.Based on the high security authentication of the PKI system, the private key is stored in the security chip, which is protected by hardware and cannot be read, and the key of each chip is different.

2.The key data of PCB copy board is stored and read encrypted.

Advantages:high security, the private key is stored in the security chip, hardware protection, cannot be read, and each chip has a different key. The security chip provides APIs, so users do not need to develop a security chip program.

Disadvantages:higher cost