作者: Thomas A. Kean
DOI:
关键词: Intellectual property 、 Engineering 、 Encryption 、 Field-programmable gate array 、 Key (cryptography) 、 Programmable logic array 、 Bitstream 、 Integrated circuit 、 Electrical engineering
摘要: Techniques are used to protect intellectual property cores on field programmable gate arrays. An approach is associate each array, or a limited number of arrays, with secret key. Each array may only be properly configured programmed by an appropriate encrypted bitstream (which includes one more cores). This has been encoded for the key associated particular FPGA. Other techniques also presented in this application and include network-based, nonnetwork-based, software-based, layered, other approaches. The allow core vendor charge customer per-use per-configuration their property. because useable number, possibly just one, integrated circuits.