摘要 |
According to a disclosed method for protecting a test program, a source file is translated using a primary key owned by a program provider to create a distribution file (13) and a secondary key (13a) so that an object file of the test program can be created only when the distribution file and the secondary key are used. Further, according to a disclosed LST test method, a test pattern (25) is created from a source file (27) and a scramble format (28), to decide whether a signal, sent from an LSI (23), of response to the test pattern is right or wrong based on a test plan (24).
|