Semiconductor device

ABSTRACT

Receiving a request for canceling setting, a control circuit erases data stored in a corresponding block, changes a value of a protection flag, and cancels protection setting. When an overall protection is set for any block, the control circuit prohibits access to all blocks, except when it is an operation mode for activating a memory program contained in the microcomputer. Further, control circuit permits an access to a block M only when partial protection is set, CPU is in the mode for activating a memory program contained in the microcomputer and the access is for reading an instruction code in accordance with an instruction fetch.

CROSS REFERENCE TO RELATED APPLICATION

This is a Continuation of application Ser. No. 12/884,862, filed Sep.17, 2010, which in turn is a Continuation of application Ser. No.12/180,666, filed Jul. 28, 2008, now U.S. Pat. No. 7,882,914, issuedFeb. 8, 2011, which in turn is a Continuation of application Ser. No.11/454,797, filed Jun. 19, 2006, now U.S. Pat. No. 7,421,534, issuedSep. 2, 2008.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a semiconductor device including anon-volatile storage unit and, more specifically, to a semiconductordevice with data confidentiality protecting function.

2. Description of the Background Art

Conventionally, microcomputers used for various purposes generallyinclude a non-volatile storage unit (hereinafter also referred to as anon-volatile memory) such as a flash memory or an EEPROM (ElectricallyErasable and Programmable Read Only Memory). When data is once written,a non-volatile memory retains the data even when the power is turnedoff, and it allows free rewriting of data. Therefore, a microcomputerembedded in a product with a program stored in a non-volatile memoryadvantageously allows a so-called updating, including programmodification or addition of a new function.

When a user of a microcomputer including the non-volatile memory(hereinafter also referred to as an end user) as such should rewrite theprogram stored therein, operation failure or human suffering mightpossibly occur. There is also a concern that a competitor mayunrighteously read the contents of the program. In order to preventreading or rewriting (hereinafter also referred to as an access) by theend user, it has been a general practice to add a confidentialityprotecting function (hereinafter also refereed to as “protection”) to amicrocomputer.

The protecting function is realized, by way of example, by arranging, inaddition to a data area, a protection information area for settingprotection for the data area in the non-volatile memory, and prohibitingaccess by a hardware circuit in accordance with a protection settingstored in the protection information. area.

Japanese Patent Laying-Open No. 11-120781 discloses a semiconductormemory device that allows flexible setting of write protection state bythe unit of a block group of a memory array.

When a protected program is to be updated, the protection setting mustbe cancelled prior to rewriting of the program. Therefore, addition of aprotection function inherently involves a protection canceling function.

The protection canceling function may be implemented by an arrangementin which a specific signal is applied from an external device connectedto the microcomputer to cancel protection, or an arrangement in whichprotection is cancelled only when an input ID (password) matches aspecific ID, Presence of such an arrangement itself, however, may be asecurity hole. Specifically, if an ill-intentioned third party shouldscrutinize the microcomputer and find the specific signal or thespecific ID, the protection function would be lost.

In view of the foregoing, an arrangement in which protected data iserased before canceling protection has been proposed.

Japanese Patent Laying-Open No, 2001-014871 discloses a non-volatilesemiconductor memory device in which, when cancellation of protectionsetting is instructed, all the stored data are erased, neglectingprotection setting. Japanese Patent Laying-Open No. 2003-203012discloses a microcomputer device that allows access to a non-volatilememory only after the data in the non-volatile memory has been erased.

Further, generally, a non-volatile memory is divided into a plurality ofblocks, and data is read and written block by block. Therefore, JapanesePatent Laying-Open No. 2003-203012 discloses an arrangement in whichprotection is set block by block.

Microcomputers come to have higher performances recently, and programsfor operating the microcomputers come to be larger and more complicatedaccordingly. Therefore, programmers come to use library softwareprepared for specific functions in advance, which is read (bysub-routine call) in a program, to improve efficiency of programming,rather than forming a program from scratch. Such library software isoften provided by a so-called IP (Intellectual Property) vender, otherthan the manufacturer of the microcomputer.

In the arrangement disclosed in Japanese Patent Laying-Open No.2001-014871, every memory is erased when the protection is to becancelled. Therefore, when the capacity of a stored program is small ascompared with the capacity of data area; the time required for erasurebecomes relatively long, lowering the process speed of themicrocomputer. In the arrangement disclosed in Japanese PatentLaying-Open No. 2003-203012, protection setting is done block by block,and therefore, when the program to be protected is stored over aplurality of blocks, it is necessary to set protection on every one ofthe plurality of blocks in which the program is stored, Such a processis so complicated as to cause data leakage because of erroneous settingof protection.

For an IP vendor, that library software is fetched and executed in aprogram is a common use and poses no problem. If the contents of librarysoftware itself (instruction codes) were read, however, unauthorizedcopying by a third party would be possible, which makes recovery ofdevelopment expenditure difficult, or know-how would be leaked.Therefore, protection setting becomes necessary, to prevent reading ofthe contents of library software itself, by a programmer or an end user.

By the conventional protection function, access to the protected data isprohibited uniformly, no matter whether it is a reading whileprogramming (sub-routine call) or not, Therefore, when the protection isset, use of library software becomes impossible, causing a dilemma.

SUMMARY OF THE INVENTION

The present invention was made to solve the above-described problem, anda first object thereof is to provide a semiconductor device thatrealizes high data confidentiality protecting function by simpleprocessing while not lowering speed of processing.

A second object of the present invention is to provide a semiconductordevice that allows confidentiality protection of stored instruction codeitself and at the same time allows execution of a process based on theinstruction code.

A third object of the present invention is to provide a semiconductordevice that can attain the first and second objects simultaneously.

According to a first aspect, the present invention provides asemiconductor device, including: a non-volatile storage unit including adata area divided into a plurality of blocks and a protectioninformation area storing protection information for prohibiting accessblock by block; a reading unit reading the protection information storedin the protection information area; and a control unit erasing, beforecanceling access prohibition of any of the blocks, data stored in thecorresponding block. The control unit receives the protectioninformation from the reading unit and prohibits access to every block towhich access can be prohibited by the protection information, whenaccess to any of the blocks of which access can be prohibited by theprotection information is prohibited.

According to a second aspect, the present invention provides asemiconductor device, including: a non-volatile storage unit including adata area divided into a plurality of blocks and a protectioninformation area storing protection information for prohibiting accessblock by block; a reading unit reading the protection information storedin the protection information area; a control unit erasing, beforecanceling access prohibition of any of the blocks, data stored in thecorresponding block; and an operating unit reading an operation codestored in the data area and executing a process. The control unitdetermines whether an access to a block to which access is prohibited bythe protection information may be permitted or not, based on theprotection information received from the reading unit, and permits theaccess regardless of the protection information when an access requestfor reading the instruction code is received from the operating unit.

According to a third aspect, the present invention provides asemiconductor device, including: a non-volatile storage unit including adata area divided into a plurality of blocks and a protectioninformation area storing first protection information and secondprotection information for prohibiting access block by block; a readingunit reading the first protection information and the second protectioninformation stored in the protection information area; a control uniterasing, before canceling access prohibition of any of the blocks, datastored in the corresponding block; and an operating unit reading anoperation code stored in the data area and executing a process. Thecontrol unit receives the first protection information from the readingunit, and prohibits access to every block to which access can beprohibited by the first protection information, when access to any ofthe blocks of which access can be prohibited by the first protectioninformation is prohibited, determines, based on the second protectioninformation received from the reading unit, whether an access to a blockof which access can be prohibited by the second protection informationmay be permitted or not, and permits the access regardless of the secondprotection information when an access request for reading theinstruction code is received from the operating unit.

According to the first aspect, when access prohibition is released, datais erased block by block. On the other hand, an access to any block isnot permitted until access prohibition of every block, to which accesscan be prohibited, is released. Therefore, as compared with an examplein which data stored in all blocks are erased collectively, data can beerased efficiently, and therefore, speed of processing is not lowered.Further, access prohibition of all blocks can be done integrally, andtherefore, high data confidentiality protecting function can berealized.

According to the second aspect, an access to an access-prohibited blockis not permitted, and when access prohibition is to be released, thedata stored in the corresponding block is surely erased. As anexception, when the operating unit reads a process code stored in a dataarea to execute a process, access is permitted regardless of theprotection information of the block as the access destination.Therefore, confidentiality of the instruction code itself is protectedand, at the same time, the operating unit can execute the process basedon the instruction code.

According to the third aspect, when access prohibition is released inaccordance with the first protection information, data is erased blockby block. On the other hand, an access to any block is not permitteduntil access prohibition of every block, to which access can beprohibited, is released. Therefore, as compared with an example in whichdata stored in all blocks are erased collectively, data can be erasedefficiently, and therefore, speed of processing is not lowered. Further,access prohibition of all blocks can be done integrally, and therefore,high data confidentiality protecting function can be realized. Further,an access to a block to which access is prohibited by the secondinformation is not permitted, and when access prohibition is to bereleased, the data stored in the corresponding block is surely erased.As an exception, when the operating unit reads a process code stored ina data area to execute a process, access is permitted regardless of theprotection information of the block as the access destination.Therefore, confidentiality of the instruction code itself is protectedand, at the same time, the operating unit can execute the process basedon the instruction code.

The foregoing and other objects, features, aspects and advantages of thepresent invention will become more apparent from the following detaileddescription of the present invention when taken in conjunction with theaccompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a schematic configuration of a semiconductor device inaccordance with Embodiment 1.

FIGS. 2A to 2C illustrate operation modes of the semiconductor device.

FIG. 3 shows a schematic configuration of a semiconductor device inaccordance with Embodiment 2.

FIG. 4 shows a schematic configuration of a semiconductor device inaccordance with Embodiment 3.

FIG. 5 shows a schematic configuration of a semiconductor device inaccordance with Embodiment 4.

FIG. 6 shows a schematic configuration of a semiconductor device inaccordance. with Embodiment 5.

FIG. 7 shows a schematic configuration of a semiconductor device inaccordance with Embodiment 6.

FIG. 8 shows a schematic configuration of a semiconductor device inaccordance with Embodiment 7.

FIG. 9 shows a schematic configuration of a semiconductor device inaccordance with Embodiment 8.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Embodiments of the present invention will be described in detail withreference to the figures, Throughout the figures, the same orcorresponding portions are denoted by the same reference characters, anddescription thereof will not be repeated.

Embodiment 1

Embodiment 1 is directed to a protection function proposed for an IPvendor or a programmer considering protection against an end user.

Referring to FIG. 1, a semiconductor device 101 in accordance withEmbodiment 1 includes a data bus 98, an operating unit (CPU: CentralProcessing Unit; hereinafter also denoted by “CPU”) 90, a non-volatilememory 1, a reading unit 12, a control unit 10 and a power unit 97.

Data bus 98 connects CPU 90, control unit 10, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 90 passes data to/from non-volatile memory 1 through data bus 98.Receiving a reset signal from the outside, CPU 90 reads a program storedin non-volatile memory 1 or an external memory (not shown) to beactivated, in accordance with an operation mode, as will be describedlater. Further, when CPU 90 reads a program from non-volatile memory 1to be activated, it outputs a mode signal thereof to control unit 10,

Non-volatile memory 1 is formed of a semiconductor device such as aflash memory or an EEPROM, and includes a data area 1.1 divided into aplurality of blocks and a protection information area 1.2.

Protection information area 1.2 is divided to correspond to the blocksof data area 1.1, and stores a protection setting corresponding torespective blocks of the data area. In protection information area 1.2of Embodiment 1, overall protection flags 1 a, 2 a, . . . , Na, each of1 bit, are stored, and dependent on the flag value (“0” or “1”),presence/absence of protection setting of respective blocks of data area1.1 is determined.

Reading unit 12 reads overall protection flags 1 a, 2 a, . . . , Nastored in protection information area 1.2 of non-volatile memory 1, andoutputs these to control unit 1, Reading unit 12 includes a read circuit16 and a read register 18.

Read circuit 16 receives an external reset signal and a power-on signalfrom power unit 97, reads overall protection flags 1 a, 2 a, . . . , Nastored in protection information area 1.2 and outputs the read flags toread register 18.

Read register 18 once stores each of the overall protection flags 1 a, 2a, . . . , Na and outputs their values to control unit 10. Read register18 holds the values until the overall protection flags are newlyreceived from read circuit 16, Therefore, the values output from readregister 18 are updated only at the timing of receiving the externalreset signal or receiving the power-on signal from power unit 97.

Control unit 10 includes an OR circuit 15, an activation modedetermining unit (determining unit a) 14, and a control circuit 11.

OR circuit receives overall protection flags 1 a, 2 a, . . . , Na fromread register 18 and performs a logical sum (OR) operation, and ifprotection is set for any one of overall protection flags 1 a, 2 a, . .. , Na, outputs “ON” to activation mode determining unit 14.

When “ON” is received from OR circuit 15, activation mode determiningunit 14 outputs a protection control signal for prohibiting writing andreading (hereinafter also referred to as an access) to/from all theblocks of data area 1.1, to control circuit 11. When a mode signal isreceived from CPU 90 as an exception, activation mode determining unit14 masks the protection control signal that prohibits an access, Thereason for this is that CPU 90 reads a program stored in non-volatilememory 1 to be activated, and therefore, CPU 90 cannot be activatedunless access prohibition is released.

Receiving a request for canceling protection setting for any of theblocks of data area 1.1 through the data bus, control circuit 11 erasesdata stored in the corresponding block, confirms erasure of the data,and thereafter, changes the value of protection flag corresponding tothe block stored in protection information area 1.2, to cancelprotection setting. Further, receiving an access request to any of theblocks of data area 1.1 through the data bus, control circuit 11determines whether the protection control signal for prohibiting anaccess has been received from activation mode determining unit 14 ornot. When the protection control signal for prohibiting an access is notreceived from activation mode determining unit 14, control circuit 11permits the access, reads data stored in the requested block, or writesdata to the requested block. When a protection setting request for anyof the blocks of data area 1.1 is received through the data bus, controlcircuit 11 changes the value of overall protection flag corresponding tothe block stored in protection information area 1.2, and setsprotection.

Upon receiving an external instruction, power unit 97 starts powersupply to various portions of semiconductor device 101 and,simultaneously with the start of power supply, outputs a power-on signalto read circuit 16.

As described above, semiconductor device 101 has a plurality ofoperation modes, and therefore, it is necessary to determine whetherprotection setting is effective or not, dependent on the operation mode.

FIG. 2A represents an activation mode on a program in a memory of themicrocomputer.

FIG. 2B represents an activation mode on a program in a memory outsidethe microcomputer.

FIG. 2C represents a CPU inoperative activation mode.

Referring to FIG. 2A, in the “activation mode on a program in a memoryof the microcomputer,” CPU 90 reads a program from non-volatile memory 1through data bus 98 to be activated. Therefore, to enable activation ofCPU 90, protection of non-volatile memory 1 must be temporarilydisabled.

Referring to FIG. 2B, in the “mode for activating a memory programoutside the microcomputer,” an external memory 200 is connected tosemiconductor device 101 through data bus 98. CPU 90 reads a programfrom external memory 200 through data bus 98 to be activated. Here, itis possible for any person other than the EP vendor and the programmerto write a program in external memory 200, and therefore, anill-intentioned program to read data stored in a protected block mightpossibly be executed. Therefore, in the “activation mode on a program ina memory outside the microcomputer,” protection setting of non-volatilememory 1 is always kept effective, regardless of the state of processingof CPU 90.

Referring to FIG. 2C, in the “CPU inoperative activation mode,” anexternal device 202 is connected to data bus 98 of semiconductor device101. External device 202 directly accesses to non-volatile memory 1,regardless of the process by CPU 90. Here, it is possible for any personother than the IP vendor and the programmer to connect an externaldevice 202 to semiconductor device 101, and therefore, it is possiblefor an ill-intentioned third party to directly read data stored innon-volatile memory 1. Therefore, in the “CPU inoperative activationmode,” protection setting of non-volatile memory 1 is always kepteffective, regardless of the state of processing of CPU 90.

(Protection Setting)

Again referring to FIG. 1, in a state where protection is set to none ofthe blocks in data area 1.1, when data to be protected is transferredfrom CPU 90 or from the outside, control circuit 11 writes thetransferred data to a prescribed block. Further, when protection settingfor the data is requested by CPU 90 or from the outside, control circuit11 changes the value of overall protection flag of protectioninformation area 1.2 corresponding to the block storing the data, andsets protection. Then, through similar processes, all the data stored innon-volatile memory 1 can be protected.

When a request for reading the data in the protected block is received,control circuit 11 responds by passing insignificant data other than thestored data. Further, when a request for writing data to the protectedblock is received, control circuit 11 performs no operation (neglect) ortreats the request as a violation.

(Protection Canceling)

When cancellation of protection setting for any of the blocks in dataarea 1.1 is requested from CPU 90 or from the outside, control circuit11 erases data stored in the designated block. Control circuit 11confirms by an erasure verifying operation or the like that erasure ofstored data has been complete, and then changes the value of overallprotection flag of protect information area 1.2 corresponding to theblock, to cancel protection setting of the block.

When protection is set for any of the blocks of data area 1.1, controlcircuit 11 prohibits access to every block, as it receives a protectioncontrol signal prohibiting access, from activation mode determining unit14. Therefore, even when protection setting for a block is cancelled, itfollows that protection is set for all the blocks of data area 1.1 aslong as there is another block for which protection is set.Specifically, control circuit 11 does not permit access to any of theblocks of data area L 1 unless protection setting for all the blocks ofdata area 1.1 is cancelled.

Therefore, access to data area 1.1 is allowed only after cancellation ofprotection setting is requested for every block in data area 1.1 by CPU90 or from the outside and data stored in every block is erased.

Reading unit 12 does not update the value of protection flags until itreceives an external reset signal or a power-on signal from power unit97. Therefore, protection setting or cancellation is made effective whensemiconductor device 101 is reset or when the power is restored.

As described above, when protection is set for at least one of theblocks of data area 1.1, protection is effective for all the blocks.Unless protection setting is cancelled for all the blocks of data area1.1, all the blocks are kept protected.

Specifically, while protection of data area 1.1 can readily be set blockby block, canceling protection setting of data area 1. requirescomplicated processing for each of the blocks.

According to Embodiment 1 of the present invention, when protectionsetting of the data area is to be cancelled, data is erased and valuesof protection flags are changed block by block. Therefore, as comparedwith collective erasure of all blocks, data can be erased efficiently,and therefore, speed of processing is not lowered. In order to cancelprotection setting of the data area, protection setting for every blockmust be cancelled. Therefore, in order to cancel protection setting,data stored in every block must be erased. This realizes highly reliabledata confidentiality protection function.

Further, according to Embodiment 1 of the present invention, controlunit 10 permits an access from CPU 90 when CPU 90 is in the “activationmode on a program in a memory of the microcomputer,” and does not permitany access when it is in other modes. Therefore, data leakage through arequest from an external device connected to semiconductor device 101can be prevented.

Embodiment 2

In Embodiment 1, a semiconductor device having a protection functionproposed for an IP vendor or a programmer considering protection againstan end user has been described.

In Embodiment 2, a semiconductor device having a protection functionproposed for an IP vendor considering protection against a programmer oran end user will be described.

Referring to FIG. 3, a semiconductor device 102 in accordance withEmbodiment 2 includes a data bus 98, a CPU 92, a non-volatile memory 2,a reading unit 22, a control unit 20 and a power unit 97.

Data bus 98 connects CPU 92, control unit 20, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 92 passes data to/from non-volatile memory 2 through data bus 98.Similar to CPU 90 in accordance with Embodiment 1, when CPU 92 reads aprogram from non-volatile memory 2 to be activated (in the “activationmode on a program in a memory of the microcomputer”), it outputs a modesignal to control unit 20).

Further, CPU 92 includes a program counter (PC) 95, and in accordancewith a program counter value of program counter 95, reads an instructioncode from non-volatile memory 2 and executes processing. Such reading ofan instruction code by CPU 92 is referred to as “instruction fetch.” Theprogram counter value is successively increased (count-up) as CPUexecutes processes.

Further, making an access to non-volatile memory 2, CPU 92 outputs anaddress of the access destination (hereinafter also referred to as anaccess address) of non-volatile memory 2 to control unit 20. At the sametime, CPU 92 outputs a status signal (hereinafter also referred to as anaccess status), indicating whether the access is in accordance with aninstruction fetch or an access to data other than the instruction fetch(hereinafter also referred as a data access), to control unit 20.

Non-volatile memory 2 is formed of a semiconductor device such as aflash memory or an EEPROM, and includes a data area 2.1 divided into aplurality of blocks and a protection information area 2.2.

Data area 2.1 is divided into blocks 1, 2, . . . , M, N, in which data1, 2, . . . , M, are stored, respectively.

Protect information area 2.2 is arranged to correspond to a prescribedblock among the blocks included in data area 2.1, and protection settingfor the prescribed block is stored therein. In protection informationarea 2.2 in accordance with Embodiment 2, a partial protection flag Mbof 1 bit for a block M among blocks 1, 2, . . . , M, . . . , N includedin data area 2.1 is stored, and dependent on the flag value (“0” or“1”), presence/absence of protection setting for the block M isdetermined.

Reading unit 22 reads partial protection flag Mb stored in protectioninformation area 2.2 of non-volatile memory 2, and outputs the same tocontrol unit 20. Reading unit 22 includes a read circuit 26 and a readregister 28.

Read circuit 26 receives an external reset signal or a power-on signalfrom power unit 97, reads partial protection flag Mb stored inprotection information area 2.2 and outputs the read flag to readregister 28.

Read register 28 once stores the partial protection flag Mb and outputsits value to control unit 20. Read register 28 holds the value until thepartial protection flag Mb is newly received from read circuit 26.Therefore, the value output from read register 28 is updated only at thetiming of receiving the external reset signal or receiving the power-onsignal from power unit 97.

Control unit 20 includes an access mode determining unit (determiningunit b) 24 and a control circuit 21.

Dependent on the partial protection flag Mb stored in read register 27,when protection is set for the block M, access mode determining unit 24outputs a protection control signal for prohibiting an access to block Mof data area 2.1, to control circuit 21. As an exception, only when themode signal has been received from CPU 92 and it is a reading of aninstruction code in accordance with an instruction fetch from CPU 92 toblock M, access mode determining unit 24 masks the protection controlsignal for prohibiting the access. This is to permit only a sub-routinecall when a program formed by a programmer is executed by CPU 92.

Receiving a request for canceling protection setting for block M of dataarea 2.1 through the data bus, control circuit 21 erases data stored inblock M, confirms erasure of the data, and thereafter, changes the valueof partial protection flag Mb for block M stored in protectioninformation area 2.2, to cancel protection setting. Further, receivingan access request to block M of data area 2.1 through the data bus,control circuit 11 determines whether the protection control signal forprohibiting an access has been received from access mode determiningunit 24 or not. When the protection control signal for prohibiting anaccess is not received, control circuit 21 permits the access, readsdata stored in the requested block M, or writes data to the requestedblock M. Further, receiving a request for setting protection for block Mof data area 2.1 through the data bus, control circuit 21 changes thevalue of partial protection flag Mb stored in protection informationarea 2.1 to set protection.

Power unit 97 is the same as that of Embodiment 1 and, therefore,detailed description thereof will not be repeated.

(Protection Setting)

In a state where protection is not set to block M in data area 2.1, whendata to be protected is transferred from CPU 92 or from the outside,control circuit 21 writes the transferred data to block M. Further, whenprotection setting for the data is requested by CPU 92 or from theoutside, control circuit 21 changes the value of partial protection flagMb corresponding to block M storing the data, and sets protection.

As described above, with protection set for block M, control circuit 21permits an access to block M when CPU 92 is in the “activation mode on aprogram in a memory of the microcomputer” and the access is for readingan instruction code in accordance with an instruction fetch. Therefore,when CPU 92 fetches an instruction code stored in a block other thanblock M, executes the instruction and makes a data access to block Mduring execution of the process, control circuit 21 prohibits theaccess.

When a request for reading the data in the protected block is received,control circuit 21 responds by passing insignificant data other than thestored data. Further, when a request for writing data to the protectedblock is received, control circuit 21 performs no operation (neglect) ortreats the request as a violation.

(Protect Cancellation)

When cancellation of protection setting for block M in data area 2.1 isrequested from CPU 90 or from the outside, control circuit 11 erasesdata stored in block M. Control circuit 21 confirms by an erasureverifying operation or the like that erasure of stored data has beencomplete, and then changes the value of partial protection flag Mb ofprotect information area 2.2, to cancel protection setting of block M.

As described above, control circuit 21 invalidates protection only forreading of an instruction code in accordance with an instruction fetch,of the library software stored in data area 2.1. Therefore, whilerealizing a sub-routine call in a program executed by CPU 92, leakage ofinstruction code itself can be prevented.

According to Embodiment 2 of the present invention, an access to theblock for which protection is set is not permitted, and when protectionsetting is to be cancelled, the data stored in the corresponding blockis erased reliably. As an exception, only when CPU 92 reads andprocesses a processing code such as library software stored in the dataarea, an access is permitted regardless of the protection information.Therefore, it becomes possible to prevent leakage of instruction codeitself and to allow sub-routine call by the CPU 92 without restriction.

Embodiment 3

In Embodiments 1 and 2, protection functions directed to differentobjects have been described.

In Embodiment 3, a semiconductor device that can simultaneously realizefunctions of Embodiments 1 and 2 will be described. In the followingdescription, for clarification, the protection in accordance withEmbodiment 1 is also referred to as “overall protection,” and protectionin accordance with Embodiment 2 is also referred to as “partialprotection.”

Referring to FIG. 4, a semiconductor device 103 in accordance withEmbodiment 3 includes a data bus 98, a CPU 92, a non-volatile memory 3,a reading unit 32, a control unit 30 and a power unit 97.

Data bus 98 connects CPU 92, control unit 30, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 92 passes data to/from non-volatile memory 3 through data bus 98.Similar to CPU 90 in accordance with Embodiment 1, when CPU 92 reads aprogram from non-volatile memory 3 to be activated (in the “activationmode on a program in a memory of the microcomputer”), it outputs a modesignal to control unit 30.

Further, similar to CPU 92 in accordance with Embodiment 2, CPU 92includes a program counter (PC) 95, and in accordance with a programcounter value of program counter 95, reads an instruction code fromnon-volatile memory 3 and executes processing. When making an access tonon-volatile memory 3, CPU 92 outputs an access address and an accessstatus to control unit 30.

Non-volatile memory 3 is formed of a semiconductor device such as aflash memory or an EEPROM, and includes a data area 3.1 divided into aplurality of blocks and protection information areas 3.2 and 3.3.

Data area 3.1 is divided into blocks 1, 2, . . . , M, . . . , N, inwhich data 1, 2, . . . , M, . . . , N are stored, respectively.

Protection information area 3.2 is divided to correspond to the blocksof data area 3.1, and stores overall protection setting for respectiveblocks of the data area. In protection information area 3.2 inaccordance with Embodiment 3, overall protection flags 1 a, 2 a, . . . ,Ma, . . . , Na, each of 1 bit, are stored, and dependent on the flagvalue (“0” or “1”), presence/absence of overall protection setting foreach block of data area 3.1 is determined.

Protect information area 3.3 is arranged to correspond to a prescribedblock among the blocks included in data area 3.1, and protection settingfor the prescribed block is stored therein. In protection informationarea 3.3 in accordance with Embodiment 3, a partial protection flag Mbfor a block M among blocks 1, 2, . . . , M, . . . , N included in dataarea 3.1 is stored, and dependent on the flag value (“0” or “1”),presence/absence of protection setting for the block M is determined.

Reading unit 32 reads overall protection flags 1 a, 2 a, . . . , Ma, . .. , Na and partial protection flag Mb stored in protection informationareas 3.2 and 3.3 of non-volatile memory 3, and outputs these to controlunit 30. Reading unit 32 includes a read circuit 36 and read registers18 and 28.

Read circuit 36 receives an external reset signal or a power-on signalfrom power unit 97, reads overall protection flags 1 a, 2 a, . . . , Ma,. . . , Na stored in protection information area 3.2 and outputs theseto read register 18, and reads partial protection flag Mb stored inprotection information area 3.3 and outputs the read flag to readregister 28.

Read register 18 is the same as that of Embodiment 1 and, therefore,detailed description will not be repeated. Further, read register 28 isthe same as that of Embodiment 2 and, therefore, detailed descriptionthereof will not be repeated.

Control unit 30 includes a priority circuit (priority circuit M) 34, ORcircuits 35 and 38, an activation mode determining unit (determiningunit a) 14, an access mode determining unit (determining unit b) 24, anda control circuit 31.

As will be described later, priority circuit 34 is for assigning higherpriority to the partial protection than the overall protection in orderto avoid a problem caused when overall protection and partial protectionshould be set simultaneously on block M. Receiving overall protectionflag Ma, and partial protection flag Mb set for block M of data area3.1, priority circuit 34 gives priority to setting by partial protectionflag Mb. Specifically, priority circuit 34 performs a logical operationbetween overall protection flag Ma received from read register 18 andpartial protection flag Mb received from read register 28, and whenpartial protection is set by partial protection flag Mb, protectionsetting by overall protection flag Ma is neglected and a valueindicating cancellation of overall protection is output to OR circuit35.

OR circuit 35 performs a logical sum (OR) operation between the overallprotection flags 1 a, 2 a, . . . , Na (except for Ma) received from readregister 18 and the value received from priority circuit 34, and if anyone of the overall protection flags 1 a, 2 a, . . . , Na (except for Ma)and the value received from priority circuit 34 has a value indicatingsetting of overall protection, outputs “ON” to activation modedetermining unit 14.

Activation mode determining unit 14 is the same as that of Embodiment 1and, therefore, detailed description thereof will not be repeated.Further, access mode determining unit 24 is the same as that ofEmbodiment 2 and, therefore, detailed description thereof will not berepeated.

OR circuit 38 couples a protection control signal output from activationmode determining unit 14 and a protection control signal output fromaccess mode determining unit 24, and outputs the result to controlcircuit 31.

Receiving a request for canceling overall protection setting for any ofthe blocks of data area 3.1 through the data bus 98, control circuit 31erases data stored in the corresponding block, confirms erasure of thedata, and thereafter, changes the value of protection flag correspondingto the block stored in protection information area 3.2, to canceloverall protection setting. Receiving a request for canceling partialprotection setting for block M of data area 3.1 through data bus 98,control circuit 31 erases data stored in block M, confirms erasure ofthe data, and thereafter, changes the value of partial protection flagMb for block M stored in protection information area 3.3, to cancelpartial protection setting. Control circuit 31 handles overallprotection and partial protection independent from each other, andtherefore, when a request for canceling overall protection setting forblock M is received, it erases the stored data and thereafter changesthe value of overall protection flag Ma for block M, while it does notchange the value of partial protection flag Mb. Therefore, when bothoverall protection and partial protection are set, it is necessary tocancel both protection settings.

Receiving an access request to any of the blocks of data area 3.1through data bus 98, control circuit 31 determines whether theprotection control signal for prohibiting an access has been receivedfrom OR circuit 38 or not. When the protection control signal forprohibiting an access is not received, control circuit 31 permits theaccess, and reads data stored in the requested block, or writes data tothe requested block.

When an overall protection setting request for any of the blocks of dataarea 3.1 is received through data bus 98, control circuit 31 changes thevalue of overall protection flag corresponding to the block stored inprotection information area 3.2, and sets overall protection. Further,receiving a request for setting partial protection for block M of dataarea 3.1 through data bus 98, control circuit 31 changes the value ofpartial protection flag Mb stored in protection information area 3.3 toset partial protection.

Power unit 97 is the same as that of Embodiment 1 and, therefore,detailed description thereof will not be repeated.

(Protection Setting)

In a state where neither overall protection nor partial protection isset to data area 3.1, when data to be protected is transferred from CPU92 or from the outside, control circuit 31 writes the transferred datato a prescribed block. Further, when overall protection setting orpartial protection setting for the data is requested by CPU 92 or fromthe outside, control circuit 31 changes the value of overall protectionflags 1 a, 2 a, . . . , Ma, . . . , Na or the value of partialprotection flag Mb, corresponding to the block storing the data, andsets protection. Receiving the overall protection request or the partialprotection request, control circuit 31 sets protection independent fromeach other.

Therefore, when overall protection is set by any of the overallprotection flags 1 a, 2 a, . . . , Ma, . . . , Na, control circuit 31prohibits access to every block, except when CPU 92 is in the“activation mode on a program in a memory of the microcomputer”.

Further, when partial protection is set by partial protection flag Mb,control circuit 31 prohibits access to block M, even when CPU 92 is inthe “activation mode on a program in a memory of the microcomputer”.Control circuit 31 permits an access to block M only when CPU 92 is inthe “activation mode on a program in a memory of the microcomputer” andthe access is for reading an instruction code in accordance with aninstruction fetch.

(Protect Cancellation)

When cancellation of overall protection setting or partial protectionsetting for any of the blocks in data area 3.1 is requested from CPU 92or from the outside, control circuit 31 erases data stored in thedesignated block. Control circuit 31 confirms by an erasure verifyingoperation or the like that erasure of stored data has been complete, andthen changes the value of overall protection flag or partial protectionflag corresponding to the block, to cancel protection setting of theblock. Receiving a request for canceling overall protection setting orpartial protection setting, control circuit 31 cancels protectionsetting independent from each other.

Therefore, when overall protection and partial protection are set forthe block M, it is necessary to apply a request for canceling each ofthe protection settings to control circuit 31, to cancel theseprotection settings.

(Priority Circuit)

As described above, the overall protection is a function enabling an EPvendor or a programmer to set protection against an end user. On theother hand, the partial protection is a function enabling an EP vendorto set protection against a programmer and an end user. In the commonprocess of distribution, an IP vendor sets partial protection on thelibrary software of himself/herself, and thereafter, a programmer setsan overall protection on the program he/she made. Then, the resultingsemiconductor device is provided to the end user.

Assume that a programmer stores a program he/she made in a block otherthan block M, and then erroneously sets overall protection for block M.In order to update the program stored in data area 3.1 of non-volatilememory 3, it is necessary to cancel the overall protection setting ofblock M. As described above, in order to cancel protection setting, itis necessary to erase data stored in the corresponding block. Therefore,cancellation of overall protection for block M means erasure of thesoftware library stored in block M. Specifically, it becomes necessaryfor the programmer to ask the IP vender to provide the library softwareagain, simply to update the program he/she made.

Therefore, priority circuit 34 invalidates the overall protectionsetting for the block M in which library software is stored.Specifically, when partial protection is set for block M, prioritycircuit 34 regards block M as free of overall protection, even when theoverall protection has been set simultaneously.

Therefore, even when a programmer erroneously sets overall protectionfor the block storing the library software, it is possible to update theprogram without erasing the library software.

Priority circuit 34 is only for correcting a mistake of a programmer orthe like, and it is not an essential component. Provision of thecircuit, however, is desirable to prevent any difficult situationpossibly caused by an error or mistake.

According to Embodiment 3, when the overall protection of the data areais cancelled, data are erased and the values of overall protection flagsare changed block by block. Therefore, as compared with collectiveerasure of all blocks, data can be erased efficiently, and therefore,speed of processing is not lowered. In order to cancel overallprotection setting of the data area, overall protection setting forevery block must be cancelled. Therefore, in order to cancel overallprotection setting, data stored in every block must be erased. Thisrealizes highly reliable data confidentiality protection function. Anaccess to the block for which partial protection is set is notpermitted, and when partial protection setting is to be cancelled, thedata stored in the corresponding block is erased reliably. As anexception, only when CPU 92 reads and processes a processing code suchas library software stored in the data area, an access is permittedregardless of the partial protection flag. Therefore, it becomespossible to prevent leakage of instruction code itself and to allowsub-routine call by the CPU 92 without restriction.

Further, according to Embodiment 3 of the present invention, when bothoverall protection and partial protection are set for one same block,partial protection is given priority, and overall protection isneglected. Therefore, even when overall protection should erroneously beset for a block that has already been under partial protection, it ispossible to cancel setting of the overall protection of the blockwithout erasing the data stored in that block and to update the data.

Embodiment 4

In Embodiments 1 to 3, arrangements for setting protection using theoverall protection flags or the partial protection setting flag, eachformed of 1 bit, have been described.

In Embodiment 4, an arrangement that uses an overall protection flag ora partial protection flag each formed of a plurality of bits will bedescribed. In Embodiment 4, an example in which the characteristicarrangement applied to semiconductor device 103 of Embodiment 3 will bedescribed.

Referring to FIG. 5, a semiconductor device 104 in accordance withEmbodiment 4 includes a data bus 98, a CPU 92, a non-volatile memory 4,a reading unit 42, a control unit 40 and a power unit 97.

Data bus 98 connects CPU 92, control unit 40, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 92 is the same as that of Embodiment 3 and, therefore, detaileddescription thereof will not be repeated.

Non-volatile memory 4 includes a data area 4.1 divided into a pluralityof blocks and protection information areas 4.2 and 4.3.

Data area 4.1 is divided into blocks 1, 2, . . . , M, . . . , N, inwhich data 1, 2, . . . , M, . . . , N are stored, respectively.

Protection information area 4.2 is divided to correspond to the blocksof data area 4.1, and stores overall protection setting for respectiveblocks of the data area. In protection information area 4.2 inaccordance with Embodiment 4, overall protection flags 1 a′, 2 a′, . . ., Ma′, . . . , Na′, each of 2 bits, are stored, and dependent on theflag value (e.g., “00” or “11”), presence/absence of overall protectionsetting for each block of data area 4.1 is determined.

In protection information area 4.3, partial protection setting for ablock M among blocks included in data area 4.1 is stored. In protectioninformation area 4.3 in accordance with Embodiment 4, a partialprotection flag Mb′ of 2 bits is stored, and dependent on the flag value(e.g., “00” or “11”), presence/absence of partial protection setting forthe block M is determined.

Reading unit 42 reads overall protection flags 1 a′, 2 a′, . . . , Ma′,. . . , Na′ and partial protection flag Mb′ stored in protectioninformation areas 4.2 and 4.3 of non-volatile memory 4, and outputsthese to control unit 40, Reading unit 42 includes a read circuit 46 andread registers 48 and 47.

Read circuit 46 receives an external reset signal and a power-on signalfrom power unit 97, reads overall protection flags 1 a′, 2 a′, . . . ,Ma′, . . . , Na′ stored in protection information area 4.2 and outputsthese bit by bit to read register 48. At the same time, it reads partialprotection flag Mb′ stored in protection information area 4.3 andoutputs the read flag bit by bit to read register 47.

Read register 48 once stores each of overall protection flags 1 a′, 2a′, . . . , Ma′, . . . , Na′ bit by bit, and outputs values ofrespective bits to control unit 40.

Read register 47 once stores partial protection flag Mb′ bit by bit andoutputs the value of each bit to control unit 40.

Control unit 40 corresponds to control unit 30 in accordance withEmbodiment 3, with OR circuits 43.1, 43.2, . . . , 43.M, . . . , 43.Nand 44 added.

OR circuit 43.1 reads the 0th bit value 1 a′(0) and 1st bit value 1a′(1) of the overall protection flag 1 a′ stored in read register 48,and performs an OR operation. Then, OR circuit 43.1 outputs the resultof logical sum operation to OR circuit 35. Specifically, OR circuit 43.1determines that protection is set, when at least one of the 0th bitvalue 1 a′(0) and 1st bit value 1 a(1) of overall protection flag 1 a′is a value for setting protection.

In the similar manner, OR circuits 43.2, . . . , 43.M, . . . , 43.N readthe 0th bit values 2 a′(0), . . . , Ma′(0), . . . , Na′(0) and 1st bitvalues 2 a′(1), . . . , Ma′(1), . . . , Na′(1) of the overall protectionflags 2 a′, . . . , Ma′, . . . , Na′, and perform OR operations. Then,OR circuits 43.2, . . . , 43.M, . . . , 43.N output results of logicalsum operations to OR circuit 35.

Receiving a request for setting overall protection for any of the blocksof data area 4.1 through data bus 98, control circuit 41 changes allbits constituting the overall protection flag corresponding to the blockstored in protection information area 4.2 to the same value, to setprotection. Further, receiving a request for setting protection forblock M of data area 4.1 through data bus 98, control circuit 41 changesall bits constituting the partial protection flag Mb stored inprotection information area 4.3 to the same value, to set protection.Receiving a protection cancellation request, control circuit 41 changesall bits constituting the overall protection flag stored in protectioninformation area 4.2 or all bits constituting partial protection flag Mbstored in protection information area 4.3 to the same value in thesimilar manner as for setting protection, to cancel protection.Specifically, control circuit 41 writes “00” or “11” dependent onwhether protection is to be set or cancelled.

Other processes by control circuit 41 are the same as those of controlcircuit 31 in accordance with Embodiment 3 and, therefore, detaileddescription thereof will not be repeated.

Further, priority circuit 34, OR circuits 35 and 38, activation modedetermining unit (determining unit a) 14 and access mode determiningunit (determining unit b) 24 are the same as those of Embodiment 3 and,therefore, detailed description thereof will not be repeated.

Power unit 97 is the same as that of Embodiment 3 and, therefore,detailed description thereof will not be repeated.

As described above, control circuit 41 sets protection by setting aplurality of bits constituting the flag to the same value. Therefore,even if a bit forming the flag were volatilized and lost by some cause,protection setting can be maintained.

By way of example, assume that the flag value indicating protectionsetting is “1”. Receiving a request for setting overall protection forblock 1, control circuit 41 changes the 0th bit value 1 a′(0) and the1st bit value 1 a′(1) of overall protection flag 1 a′ both to “1”.Similarly, receiving a request for canceling overall protection settingfor block 1, control circuit 41 erases data stored in block 1, andchanges the 0th bit value 1 a′(0) and the 1st bit value 1 a′(1) ofoverall protection flag 1 a′ both to “0”. Specifically, receiving arequest for setting protection, control circuit 41 changes the values ofprotection flag to “11” and receiving a request for canceling protectionsetting, changes the values of protection flag to “00”.

Assume that from a state where overall protection is set for block 1,that is, where the values of overall protection flag 1 a′ have beenchanged to “11”, 1 bit of data is volatilized by some cause to “10”. Inthat case, the values applied to OR circuit 43.1 are changed from “1”and “1” to “1” and “0”. The value output from OR circuit 43.1, however,is kept “1”, and hence, overall protection setting is not cancelled.

Therefore, even when a bit constituting the protection flag werevolatilized by some cause, erroneous cancellation of protection settingcan be avoided. As is apparent from the foregoing, by increasing thenumber of bits constituting the protection flag, protection function canbe enhanced.

Though an example in which the characteristic arrangement describedabove is applied to the semiconductor device in accordance withEmbodiment 3 that simultaneously realizes the overall protectionfunction of Embodiment 1 and the partial protection function ofEmbodiment 2 has been described in Embodiment 4, the arrangement cansimilarly be applied to the semiconductor device in accordance withEmbodiment 1 or the semiconductor device in accordance with Embodiment2.

According to Embodiment 4, in addition to the effect attained byEmbodiment 3, even if the overall protection flag for setting overallprotection or the partial flag for setting partial protection werevolatilized by some cause, the protection set by the protection flagwould not be cancelled unless all the bit values constituting the flagare changed. Therefore, as compared with an example using protectionflag of 1 bit, a semiconductor device with enhanced protection functioncan be provided.

Embodiment 5

In Embodiments 2 to 4, arrangements for setting partial protection forone of the plurality of blocks forming the data area have beendescribed.

In Embodiment 5, an arrangement for setting partial protectionintegrally for a plurality of blocks will be described. In Embodiment 5,an example in which the characteristic arrangement is applied to thesemiconductor device of Embodiment 4 will be described.

When library software stored in the non-volatile memory has largecapacity and cannot be contained in one block, the software is storedacross a number of blocks. In that case, it is desirable that thelibrary software is handled as one integral unit. Therefore, a functionthat regards a plurality of blocks as one block and sets partialprotection integrally over the plurality of blocks becomes necessary.

Referring to FIG. 6, a semiconductor device 105 in accordance withEmbodiment 5 includes a data bus 98, a CPU 92, a non-volatile memory 5,a reading unit 52, a control unit 50 and a power unit 97.

Data bus 98 connects CPU 92, control unit 50, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 92 is the same as that of Embodiment 4 and, therefore, detaileddescription thereof will not be repeated.

Non-volatile memory 5 includes a data area 5.1 divided into a pluralityof blocks and protection information areas 5.2 and 5.3.

Data area 5.1 is divided into blocks 1, 2, . . . , M, . . . , N, inwhich data 1, 2, . . . , L, M, . . . , N are stored, respectively.

Protection information area 5.2 is divided to correspond to the blocksof data area 5.1, and stores overall protection flags 1 a′, 2 a′, . . ., La′, Ma′, . . . , Na′.

Protection information area 5.3 stores a partial protection flag forsetting partial protection for a plurality of blocks among the blocksforming data area 5.1. In Embodiment 5, partial protection flags Lb′ andMb′ for setting partial protection for blocks L and M are stored.

Similar to Embodiment 4, overall protection flags 1 a′, 2 a′, . . . ,La′, Ma′, . . . , Na′ and partial protection flags Lb′ and Mb′ are eachformed of 2 bits.

Reading unit 52 reads overall protection flags 1 a′, 2 a′, . . . , La′,Ma′, . . . , Na′ and partial protection flags Lb′ and Mb′ stored inprotection information areas 5.2 and 5.3 of non-volatile memory 5, andoutputs these to control unit 50. Reading unit 52 includes a readcircuit 56 and read registers 58 and 57.

Read circuit 56 receives an external reset signal and a power-on signalfrom power unit 97, reads overall protection flags 1 a′, 2 a′, . . . ,La′, Ma′, . . . , Na′ and outputs these to read register 58. At the sametime, it reads partial protection flags Lb′ and Mb′ and outputs the readflags to read register 57.

Read register 58 once stores each of overall protection flags 1 a′, 2a′, . . . , La′, Ma′, . . . , Na′ bit by bit, and outputs values ofrespective bits to control unit 50.

Read register 57 once stores partial protection flags Lb′ and Mb′ bit bybit and outputs the value of each bit to control unit 50.

Control unit 50 corresponds to control unit 40 in accordance withEmbodiment 4, with OR circuits 43.L and 43.M replaced by an OR circuit53.LM, and OR circuit 44 replaced by an OR circuit 54.

OR circuit 53.LM reads the 0th bit value La′(0) and 1st bit value La′(1)of the overall protection flag La′ and the 0th bit value Ma′(0) and 1stbit value Ma′(1) of the overall protection flag Ma′ stored in readregister 58, and performs a logical sum (OR) operation. Then, OR circuit53.LM outputs the result of logical sum operation to priority circuit34.

Similarly, OR circuit 54 reads the 0th bit value Lb′(0) and 1st bitvalue La′(1) of the partial protection flag Lb′ and the 0th bit valueMb′(0) and 1st bit value Mb′(1) of the partial protection flag Mb′stored in read register 57, and performs a logical sum (OR) operation.Then, OR circuit 54 outputs the result of logical sum operation topriority circuit 34.

Specifically, OR circuits 53.LM and 54 determine that overall protectionor partial protection is set for blocks L and M, when overall protectionor partial protection is set for at least one of blocks L and M.

Priority circuit 34, OR circuits 35 and 38, activation mode determiningunit (determining unit a) 14 and access mode determining unit(determining unit b) 24 are the same as those of Embodiment 4 and,therefore, detailed description thereof will not be repeated.

Power unit 97 is the same as that of Embodiment 4 and, therefore,detailed description thereof will not be repeated.

As described above, when at least one of partial protection flags Lb′and Mb′ is set for protection, OR circuit 54 provides an outputindicating that partial protection is set for blocks L and M. Whenpartial protection is set for block L or M, control circuit 41 prohibitsany access to blocks L and M, except for an access in accordance with aninstruction fetch from CPU 92. In order to cancel partial protection ofblock L or M, it is necessary to erase all data stored in blocks L andM.

Thus, integral protection of data stored in blocks L and M is madepossible.

Though an arrangement for setting partial protection over two blocksamong a plurality of blocks included in the data area has been describedin Embodiment 5, the number of blocks is not limited to two. The numberof blocks may appropriately be designed considering, for example, thevolume of library software to be stored.

Though an example in which the characteristic arrangement describedabove is applied to the semiconductor device of Embodiment 4 has beendescribed in Embodiment 5, the arrangement can similarly be applied tothe semiconductor device in accordance with Embodiment 2 or Embodiment 3having the partial protection. function.

According to Embodiment 5, in addition to the effects of Embodiment 4,partial protection can be set across a plurality of blocks, and settingand cancellation of partial protection for the. blocks can be done in anintegrated manner. Therefore, even when library software comes to belarge volume and must be stored over a plurality of blocks, leakage ofprocess codes can be prevented in the similar' manner as when thesoftware is stored in one block.

Embodiment 6

In Embodiment 5, an arrangement for setting partial protectionintegrally across a plurality of blocks has been described.

In Embodiment 6, an arrangement that allows independent setting of aplurality of partial protections will be described. In Embodiment 6, anexample in which the characteristic arrangement is applied to thesemiconductor device 104 in accordance with Embodiment 4 will bedescribed.

When library software is supplied by a plurality of IP vendors, afunction that allows partial protections for a plurality of blocksindependent from each other becomes necessary.

Referring to FIG. 7, a semiconductor device 106 in accordance withEmbodiment 6 includes a data bus 98, a CPU 92, a non-volatile memory 5,a reading unit 52, a control unit 60, and a power unit 97.

Data bus 98 connects CPU 92, control unit 60, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 92 is the same as that of Embodiment 4 and, therefore, detaileddescription thereof will not be repeated.

Non-volatile memory 5 and reading unit 52 are the same as those ofEmbodiment 4 and, therefore, detailed description thereof will not berepeated.

Control unit 60 corresponds to control unit 40 of Embodiment 4, with anOR circuit 64, a priority circuit (priority circuit L) 62 and an accessmode determining unit (determining unit b) 65 added and OR circuit 38replaced by OR circuit 68.

OR circuit 64 reads the 0th bit value Lb′(0) and 1st bit value Lb′(1) ofpartial protection flag Lb′ stored in read register 57, and performs alogical sum (OR) operation. Then, OR circuit 64 outputs the result oflogical sum operation to priority circuit 62.

Priority circuit 62 performs a logical operation between the value ofoverall protection flag La′ received from OR circuit 43.L and the valueof partial protection flag Lb′ received from OR circuit 64, and whenpartial protection is set by the partial protection flag Lb′, neglectsthe setting of overall protection by overall protection flag La′, andoutputs a value indicating cancellation of overall protection to ORcircuit 35.

Similar to access mode determining unit 24 of Embodiment 4, access modedetermining unit 65 outputs a protection control signal inhibiting anaccess to block L of data area 5.1 to OR circuit 68, when partialprotect is set for block L, based on the value of partial protectionflag Lb′ output from OR circuit 64. As an exception, when the modesignal is received from CPU 92 and it is a reading of an instructioncode in accordance with an instruction fetch for block L from CPU92,access mode determining unit 65 masks the protection control signalinhibiting the access.

OR circuit 68 couples protection control signals output from activationmode determining unit 14 and access mode determining units 65 and 24,respectively, and outputs the result to control circuit 41.

Priority circuit 34, OR circuit 35, activation mode determining unit 14,and access mode determining unit 24 are the same as those of Embodiment4 and, therefore, detailed description will not be repeated.

Power unit 97 is the same as that of Embodiment 4 and, therefore,detailed description will not be repeated.

As described above, access mode determining units 65 and 24 determinewhether partial protection is set for blocks L and M, dependent on thevalues of partial protection flags Lb′ and Mb′, respectively. Prioritycircuits 62 and 34 determine whether setting of overall protection flagsLa′ and Ma′ is effective or not, dependent on the values of partialprotection flags Lb′ and Mb′, respectively.

Therefore, overall protection or partial protection is set for the datastored in blocks L and M, independent from each other.

In Embodiment 6, an arrangement in which partial protection isindependently set for two of the plurality of blocks included in thedata area has been described. The number of blocks is not limited totwo, and the number may appropriately be designed considering, forexample, the number of IP vendors.

Though an example in which the characteristic arrangement describedabove is applied to the semiconductor device of Embodiment 4 has beendescribed in Embodiment 6, the arrangement can similarly be applied tothe semiconductor device in accordance with Embodiment 2 or Embodiment 3having the partial protection function.

According to Embodiment 6, in addition to the effects attained byEmbodiment 4, it becomes possible to set partial protectionindependently for each of the plurality of blocks. Therefore, when aplurality of IP vendors provide library software, partial protection canbe set independently, and the data for which partial protection has beenset is effective for any person including other IP vendors. Therefore,when a plurality of IP vendors provide library software for one samesemiconductor device, leakage of process codes of the software can beprevented.

Embodiment 7

In Embodiment 1, an arrangement that allows setting of overallprotection for all the blocks forming the non-volatile memory has beendescribed.

In Embodiment 7, an arrangement will be described which allows settingof overall protection only for limited blocks among the blocks formingthe non-volatile memory in Embodiment 7, an example in which thecharacteristic arrangement is applied to semiconductor device 101 ofEmbodiment 1 will be described.

When a program to be stored is small for the data area of thenon-volatile memory, it may be possible to store user data in additionto the program. In that case, if all the blocks forming the non-volatilememory were under overall protection, it would be impossible for an enduser to access the user data. Therefore, the arrangement is providedwhich allows setting of overall protection only for the block storing aprogram among the blocks forming the non-volatile memory.

Referring to FIG. 8, a semiconductor device 107 in accordance withEmbodiment 7 includes a data bus 98, a CPU 90, a non-volatile memory 7,a reading unit 72, a control unit 10 and a power unit 97.

Data bus 98 connects CPU 90, control unit 10, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 90 is the same as that of Embodiment 1 and, therefore, detaileddescription thereof will not be repeated.

Non-volatile memory 7 includes a data area 7.1 divided into a pluralityof blocks and a protection information area 7.2.

Data area 7.1 is divided into blocks 1, 2, . . . , L, M, . . . , N, inwhich data 1, 2, . . . , L, M, . . . , N are stored, respectively.

Protection information area 7.2 is arranged to correspond to prescribedblocks among the blocks included in data area 7.1, and stores overallprotection setting for the prescribed blocks. In protection informationarea 7.2 of Embodiment 7, overall protection flags La and Ma for blocksL and M included in data area 7.1 are stored.

Reading unit 72 reads overall protection flags La and Ma stored inprotection information area 7.2 of non-volatile memory 7, and outputsthese to control unit 10. Reading unit 72 includes a read circuit 76 andread register 78.

Read circuit 76 receives an external reset signal and a power-on signalfrom power unit 97, reads overall protection flags La and Ma stored inprotection information area 7.2 and outputs these to read register 78.

Read register 78 once stores overall protection flags La and Ma, andoutputs their values to control unit 10.

Control unit 10 and power unit 97 are the same as those of Embodiment 1and, therefore, detailed description thereof will not be repeated.

As described above, control unit 10 determines whether overallprotection is set for blocks L and M, dependent on the values of overallprotection flags La and Ma. Further, when overall protection is setneither for block L nor block M, control unit 10 permits an access toblocks L and M.

Specifically, it is not possible to set overall protection for blocksother than blocks L and M included in non-volatile memory 7. This allowssuch, a manlier of use that a program or the like as an object ofprotection is stored in blocks L and M and other blocks are opened forthe end user.

Though an arrangement in which overall protection is set for two blocksamong the plurality of blocks included in, the data area has beendescribed in Embodiment 7, the number of blocks is not limited to two.The number of blocks for which overall protection can be set mayappropriately be designed considering, for example, program volume.

Though an example in which the characteristic arrangement describedabove is applied to the semiconductor device of Embodiment 1 has beendescribed in Embodiment 7, the arrangement can similarly be applied toany of the semiconductor devices in accordance with Embodiments 3 to 6having the overall protection function.

According to Embodiment 7, effects attained by Embodiment 1 are attainedand, in addition, overall protection is set only for some of the blocksforming the non-volatile memory. Therefore, when the volume of a programas the object of overall protection is small as compared with thecapacity of the non-volatile memory, it becomes possible to open theblocks other than those storing the program, to the end user, andthereby to more efficiently use the non-volatile memory. Consequently,it becomes possible to use the non-volatile memory for a plurality ofdifferent uses, and capacity of non-volatile memory contained in thesemiconductor device can reasonably be determined.

Embodiment 8

In Embodiments 1 to 7, arrangements in which a data area and aprotection information area are arranged in the non-volatile memory havebeen described.

In Embodiment 8, an arrangement will be described in which only the dataarea is arranged in the non-volatile memory and data and protectioninformation flag are stored in the data area. In Embodiment 8, anexample in which this characteristic arrangement is applied tosemiconductor device 103 of Embodiment 3 will be described.

Referring to FIG. 9, a semiconductor device 108 in accordance withEmbodiment 8 includes a data bus 98, a CPU 92, a non-volatile memory 8,a reading unit 82, a control unit 80, and a power unit 97.

Data bus 98 connects CPU 92, control unit 80, an external memory (notshown) and an external device (not shown) to each other, mediating dataexchange.

CPU 92 is the same as that of Embodiment 3 and, therefore, detaileddescription thereof will not be repeated.

Non-volatile memory 8 includes a data area divided into a plurality ofblocks. Non-volatile memory 8 is divided into blocks 1, 2, . . . , L, M,. . . , N, in which. data 1, 2, . . . , L, M, . . . , N and overallprotection flags 1 a, 2 a, . . . , Ma, . . . , Na for respective blocksare stored. Further, a partial protection flag Mb for block M is storedin block M.

Reading unit 82 extracts overall protection flags 1 a, 2 a, . . . , Ma,. . . , Na and partial protection flag Mb from data stored innon-volatile memory 8, and outputs these to control unit 80. Readingunit 82 includes a read circuit 86 and read registers 18 and 37.

Read circuit 86 receives an external reset signal and a power-on signalfrom power unit 97, reads data stored in respective blocks ofnon-volatile memory 8, extracts overall protection flags 1 a, 2 a, . . ., Ma, . . . , Na and partial protection flag Mb included in the readdata, and outputs these to read registers 18 and 37.

Read registers 18 and 37 are the same as those of Embodiment 3 and,therefore, detailed description thereof will not be repeated.

Control unit 80 corresponds to control unit 30 in accordance withEmbodiment 3, with control circuit 31 replaced by control circuit 81.

Receiving a request for canceling protection setting for any of theblocks through data bus 98, control circuit 81 erases the data stored inthe block, and changes the value of the overall protection flag or thepartial protection flag, to cancel protection setting. Further,receiving a request for setting protection for any of the blocks throughdata bus 98, control circuit 81 changes the value of the overallprotection flag or the partial protection flag stored in the block, toset protection. Other processes performed by control circuit 81 are thesame as those of control circuit 31 of Embodiment 3 and, therefore,detailed description thereof will not be repeated.

Priority circuit 34, OR circuits 35 and 38, activation mode determiningunit 14 and access mode determining unit 24 are the same as those ofEmbodiment 3 and, therefore, detailed description thereof will not berepeated.

Power unit 97 is the same as that of Embodiment 3 and, therefore,detailed description thereof will not be repeated.

As described above, in each block of non-volatile memory 8, the overallprotection flag and the partial protection flag for setting protectionof each block are stored in addition to common data. Therefore, it ispossible to set blocks relatively freely as the object of overallprotection and partial protection.

In Embodiment 8, an example in which overall protection flag and partialprotection flag are both stored with data has been described. Either oneof the overall protection flag and the partial protection flag may bestored with the data, and the other may be stored in the protectioninformation area as in Embodiments 1 to 7.

Though an example in which the characteristic arrangement describedabove is applied to the semiconductor device of Embodiment 3 has beendescribed in Embodiment 8, the arrangement can similarly be applied toany of the semiconductor devices in accordance with Embodiments 4 to 7.

Embodiment 8 attains effects similar to those of Embodiment 3 and, inaddition, as the protection information area for storing overallprotection and partial protection. settings is unnecessary, it becomesunnecessary to arrange a protection information area beforehand for theblock as the object of protection. Therefore, a block to be the objectof overall protection or partial protection can be selected freely andchanged easily. Therefore, a semiconductor device can be realized ofwhich number of blocks as the object of protection can be changedrelatively freely in accordance with the program or subroutine to bestored in the non-volatile memory.

Although the present invention has been described and illustrated indetail, it is clearly understood that the same is by way of illustrationand example only and is not to be taken by way of limitation, the spiritand scope of the present invention being limited only by the terms ofthe appended claims.

1. A data processing device comprising a central processing unit and anonvolatile memory unit, and being capable of coupling with an externalmemory, wherein the central processing unit is capable of fetching aninstruction from the nonvolatile memory unit or the external memory, thenonvolatile memory unit comprises a storage area, which includes pluralstorage blocks, and a control block for reading/storing data from/to acorresponding storage block in accordance with address information inresponse to an access request from the central processing unit, a firststorage block is used for storing access permission information, andeach of the other storage blocks is capable of setting an accessprotection by setting the access permission information, in a firstoperation mode, which is the central processing unit fetching theinstruction from the nonvolatile memory unit, the control block permitsaccessing to a second storage block for fetching the instruction of thecentral processing unit, and in a second operation mode, which is thecentral processing unit fetching the instruction from the externalmemory, the control block prohibits accessing to the second storageblock.
 2. A data processing device according to claim 1, wherein in bothof the first and second operation modes, when the control block receivesa request for cancelling the access protection of the second storageblock, the control block controls erasing data in the second storageblock and modifies the access permission information in the firststorage block.
 3. A data processing device according to claim 2, when athird storage block different from the first storage block and thesecond storage block is still set the access protection, in the firstoperation mode, the control block permits accessing the second storageblock after cancelling the access protection of the second storageblock, and in the second operation mode, the control block prohibitsaccessing the second storage block after cancelling the accessprotection of the second storage block.