US Patent Application No: 2002/0150,252

Number of patents in Portfolio can not be more than 2000

Secure intellectual property for a generated field programmable gate array

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A way of protecting the configuration bits of the user of a configurable integrated circuit is described. The user-configurable integrated circuit has a decryption circuit block which decrypts configuration bits which have been encrypted by a plurality of encryption keys corresponding to a plurality of corresponding decryption keys for programming the integrated circuit into a desired configuration. The decryption circuit block receives the plurality of decryption keys from a corresponding plurality of decryption key circuits, at least one of which is embedded in the integrated circuit so as to prevent accessibility of the decryption key. Other decryption key circuits may be part of the integrated circuit or off-chip for accessibility of their decryption keys for ready identification of their owners; still other decryption key circuits may be embedded in the integrated circuit for inaccessibility. Such an arrangement permits the protection of the user's configuration from competitors and of the providers' IP from unauthorized usage by the user of the integrated circuit.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
AGATE LOGIC, INC.SANTA CLARA, CA63

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Wong, Dale San Francisco, CA 16 1501

Cited Art Landscape

Patent Info (Count) # Cites Year
 
NXP B.V. (1)
* 5,452,355 Tamper protection cell 26 1994
 
Cadence Design Systems, Inc. (1)
* 6,446,249 Emulation circuit with a hold time algorithm, logic and analyzer and shadow memory 68 2000
 
Altera Corporation (1)
* 6,754,862 Gaining access to internal nodes in a PLD 37 2001
 
XILINX, INC. (5)
* 5,841,867 On-chip programming verification system for PLDs 52 1996
* 6,195,774 Boundary-scan method using object-oriented programming language 80 1998
* 6,654,889 Method and apparatus for protecting proprietary configuration data for programmable logic devices 66 1999
* 6,904,527 Intellectual property protection in a programmable logic device 55 2000
* 6,366,117 Nonvolatile/battery-backed key in PLD 72 2000
 
ATMEL CORPORATION (1)
* 6,158,034 Boundary scan method for terminating or modifying integrated circuit operating modes 5 1998
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 2011/0267,095 Apparatus and Method for Licensing Programmable Hardware Sub-Designs Using a Host-Identifier 1 2011
 
MASSACHUSETTS INSTITUTE OF TECHNOLOGY (10)
7,840,803 Authentication of integrated circuits 20 2003
* 2003/0204,743 Authentication of integrated circuits 79 2003
7,818,569 Data protection and cryptographic functions using a device-specific value 8 2006
7,757,083 Integrated circuit that uses a dynamic characteristic of the circuit 16 2006
7,681,103 Reliable generation of a device-specific value 38 2006
* 2006/0271,792 DATA PROTECTION AND CRYPTOGRAPHIC FUNCTIONS USING A DEVICE-SPECIFIC VALUE 14 2006
* 2006/0221,686 INTEGRATED CIRCUIT THAT USES A DYNAMIC CHARACTERISTIC OF THE CIRCUIT 17 2006
7,904,731 Integrated circuit that uses a dynamic characteristic of the circuit 7 2009
* 2009/0222,672 Integrated Circuit That Uses A Dynamic Characteristic Of The Circuit 13 2009
8,386,801 Authentication of integrated circuits 3 2011
 
ROCKWELL COLLINS, INC. (1)
* 7,639,798 High speed data encryption architecture 1 2005
 
INTEL CORPORATION (3)
* 7,308,576 Authenticated code module 3 2001
* 2003/0126,442 Authenticated code module 27 2001
* 2003/0231,766 Shared control and information bit representing encryption key position selection or new encryption key value 3 2002
 
FREESCALE SEMICONDUCTOR, INC. (2)
* 8,666,850 Systems and methods for tracking intellectual property 0 2011
* 2012/0310,794 SYSTEMS AND METHODS FOR TRACKING INTELLECTUAL PROPERTY 0 2011
 
UNIVERSAL DATA PROTECTION CORPORATION (1)
* 2007/0172,053 Method and system for microprocessor data security 25 2006
 
Altera Corporation (1)
* 8,566,616 Method and apparatus for protecting designs in SRAM-based programmable logic devices and the like 0 2004
 
PUFCO, INC. (1)
8,630,410 Signal generator based device security 1 2007
 
XILINX, INC. (10)
7,519,823 Concealed, non-intrusive watermarks for configuration bitstreams 6 2004
7,406,673 Method and system for identifying essential configuration bits 14 2004
* 7,343,578 Method and system for generating a bitstream view of a design 12 2004
* 7,757,294 Method and system for maintaining the security of design information 6 2004
7,971,072 Secure exchange of IP cores 10 2005
7,788,502 Method and system for secure exchange of IP cores 10 2005
* 7,809,544 Methods of detecting unwanted logic in designs for programmable logic devices 2 2007
* 8,024,688 Deterring reverse engineering 3 2008
* 8,417,965 Method and circuit for secure definition and integration of cores 4 2010
8,220,060 Method and system for maintaining the security of design information 3 2010
 
SYNOPSYS, INC. (1)
* 8,729,922 Licensing programmable hardware sub-designs using a host-identifier 0 2011
 
VIASAT, INC. (3)
8,166,289 Trusted boot 3 2009
8,156,321 Overlapping state areas for programmable crypto processing circuits 0 2009
* 2009/0240,951 SYSTEM SECURITY MANAGER 0 2009
 
Verayo, Inc. (15)
7,702,927 Securely field configurable device 20 2005
7,564,345 Volatile device keys and applications thereof 22 2005
* 2006/0210,082 Volatile device keys and applications thereof 79 2005
8,782,396 Authentication with physical unclonable functions 2 2008
* 2009/0083,833 AUTHENTICATION WITH PHYSICAL UNCLONABLE FUNCTIONS 58 2008
7,839,278 Volatile device keys and applications thereof 5 2009
* 2009/0254,981 Volatile Device Keys And Applications Thereof 10 2009
8,683,210 Non-networked RFID-PUF authentication 1 2009
* 2010/0127,822 NON-NETWORKED RFID-PUF AUTHENTICATION 27 2009
8,756,438 Securely field configurable device 0 2010
* 2010/0272,255 SECURELY FIELD CONFIGURABLE DEVICE 5 2010
8,811,615 Index-based coding with a pseudo-random source 0 2010
8,468,186 Combination of values from a pseudo-random source 4 2010
* 2011/0066,670 COMBINATION OF VALUES FROM A PSEUDO-RANDOM SOURCE 11 2010
* 2011/0033,041 INDEX-BASED CODING WITH A PSEUDO-RANDOM SOURCE 4 2010
 
DELL PRODUCTS L.P. (2)
7,693,596 System and method for configuring information handling system integrated circuits 1 2005
* 2007/0146,005 System and method for configuring information handling system integrated circuits 4 2005
 
MICROSEMI SOC CORP. (2)
7,581,117 Method for secure delivery of configuration data for a programmable logic device 2 2005
* 2015/0242,620 METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES 0 2015
* Cited By Examiner