1. PCB. The most common suffix, used by many PCB design files, includes Protel, PADS, as well as ZUKEN’s Cadstar, CR5000, and Altimum’s P-CAD.
2. brd. Used by Cadence Allegro and Eagle.
3. max. Associated with ORCAD from Cadence.
4. min. The text file output by ORCAD.
5. PCBdoc. Created by newer versions of Protel, including DXP and AD6.
6. asc. Text format used by various PCB software, such as PADS, Protel, and P-CAD.
7. .dat, .neu, .net, etc. Neutral files generated by Mentor.
8. It is composed of many folders, including one named centlib (central library), which contains Mentor Expedition design files.
9. .cam. CAM350 or Camtastic 2000 files.
10. .tgz. ODB++ files generated by PCB design tools.
11. .cad. Gencad files generated by PCB design tools.
Three Common Encryption Chips to Prevent PCB Copying
In the fiercely competitive electronic and information technology product industry, encryption chips are increasingly crucial for preventing peer copying of high-development-cost products. Here are three common encryption chips:
**Solution 1: PCB Copy Board Logic Encryption Chip**
– **Chip Structure:** EEPROM + logic circuit
– **Copyright Protection Scheme:** Password authentication, symmetric algorithm authentication
– **Advantages:** Low cost, simple peripheral circuit, straightforward development
– **Disadvantages:** Low security, easy to crack
**Solution 2: Transplant Encryption Chip Based on Algorithm**
– **Chip Structure:** High-security financial-grade encryption chip
– **Copyright Protection Scheme:**
1. **Main Solution:** Algorithm transplantation, where part of the MCU program is transferred to the encryption chip for execution
2. **Auxiliary Scheme:** Symmetric algorithm authentication
– **Advantages:** High security, prevents MCU from bypassing the encryption chip
– **Disadvantages:** High cost, increased user workload, requires development of security chip programs, and a download environment for mass production
**Solution 3: Encryption Chip Based on PKI Authentication System**
– **Chip Structure:** High-security financial-grade encryption chip
– **Copyright Protection Scheme:**
1. Utilizes PKI system for high-security authentication, storing the private key in a hardware-protected security chip that is not readable, with each chip having a unique key.
2. Encrypted storage and reading of key data for PCB copy protection
– **Advantages:** High security with hardware-protected private keys, unique keys per chip, and available APIs, eliminating the need for users to develop security chip programs
– **Disadvantages:** Higher cost
2. brd. Used by Cadence Allegro and Eagle.
3. max. Associated with ORCAD from Cadence.
4. min. The text file output by ORCAD.
5. PCBdoc. Created by newer versions of Protel, including DXP and AD6.
6. asc. Text format used by various PCB software, such as PADS, Protel, and P-CAD.
7. .dat, .neu, .net, etc. Neutral files generated by Mentor.
8. It is composed of many folders, including one named centlib (central library), which contains Mentor Expedition design files.
9. .cam. CAM350 or Camtastic 2000 files.
10. .tgz. ODB++ files generated by PCB design tools.
11. .cad. Gencad files generated by PCB design tools.
Three Common Encryption Chips to Prevent PCB Copying
In the fiercely competitive electronic and information technology product industry, encryption chips are increasingly crucial for preventing peer copying of high-development-cost products. Here are three common encryption chips:
**Solution 1: PCB Copy Board Logic Encryption Chip**
– **Chip Structure:** EEPROM + logic circuit
– **Copyright Protection Scheme:** Password authentication, symmetric algorithm authentication
– **Advantages:** Low cost, simple peripheral circuit, straightforward development
– **Disadvantages:** Low security, easy to crack
**Solution 2: Transplant Encryption Chip Based on Algorithm**
– **Chip Structure:** High-security financial-grade encryption chip
– **Copyright Protection Scheme:**
1. **Main Solution:** Algorithm transplantation, where part of the MCU program is transferred to the encryption chip for execution
2. **Auxiliary Scheme:** Symmetric algorithm authentication
– **Advantages:** High security, prevents MCU from bypassing the encryption chip
– **Disadvantages:** High cost, increased user workload, requires development of security chip programs, and a download environment for mass production
**Solution 3: Encryption Chip Based on PKI Authentication System**
– **Chip Structure:** High-security financial-grade encryption chip
– **Copyright Protection Scheme:**
1. Utilizes PKI system for high-security authentication, storing the private key in a hardware-protected security chip that is not readable, with each chip having a unique key.
2. Encrypted storage and reading of key data for PCB copy protection
– **Advantages:** High security with hardware-protected private keys, unique keys per chip, and available APIs, eliminating the need for users to develop security chip programs
– **Disadvantages:** Higher cost