Proprietary core permission structure and method

Data processing: financial – business practice – management – or co – Miscellaneous

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C326S037000, C326S038000, C326S039000, C326S040000, C326S008000, C326S041000, C711S165000, C711S163000

Reexamination Certificate

active

06748368

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates generally to distributing an integrated circuit core, and more particularly to a method of ensuring that a core designed by a core supplier will be used only by an authorized party, and by such an authorized party only an authorized number of times.
BACKGROUND OF THE INVENTION
In recent years, constant innovation in silicon process technology has drastically reduced the price and increased the performance and functionality of integrated circuit devices. With these improvements come increasing demands on the integrated circuit design system developers for still faster and cheaper devices. As a result, electronic system design is now moving to a methodology known in the art as “system on a chip” in which a system is designed by integrating a plurality of existing “cores” obtained, purchased, or licensed from various suppliers.
Cores are defined as any reproducible circuit description, often referred to in the industry as logic cores or circuit cores. The term “core” as used herein is intended to cover all such definitions. In general, there are three types of cores: soft, firm, and hard. Hard cores are functions with mask layout data for the physical layout information. Firm cores are machine-readable netlists that are ready for place and route. Soft cores are available as synthesizable, encryptable files which allow the customer to optimize the core for the intended function.
The core suppliers would like to license their cores to as many customers as possible. However, suppliers are currently unable to easily monitor the number of times a licensed core is used and, therefore, whether the appropriate license fee has been paid by the customer. Moreover, suppliers cannot monitor whether only authorized parties have obtained copies of the core, or whether the core has been modified without permission.
One solution to these problems is for a supplier to directly police a customer's fabrication facility, whether within the customer's business or out-sourced. However, most customers do not want a core supplier to be able to interfere with manufacturing, even for license monitoring, particularly when manufacturing is out-sourced. Thus, a more efficient and customer-acceptable policing method is needed.
Programmable logic devices (PLDs), such as the field programmable gate array (FPGA) or the complex programmable logic device (CPLD), provide an especially convenient vehicle for integrating cores (particularly firm or soft cores) into user designs. PLDs, as described and claimed in numerous patents assigned to Xilinx, Inc., assignee of the present invention, allow a customer to configure (and reconfigure) the programmable elements on the PLD to implement various logic functions. Because of this versatility, the cores implemented on a PLD can be updated as improvements in functionality,and efficiency occur without requiring new silicon. Specifically, a PLD can simply be reconfigured with the improved design, instead of designing a new device. However, currently, the use of PLDs does not address the challenge of how to police and account for proper licensing of cores.
SUMMARY OF THE INVENTION
To address the shortcomings of the prior art, the present invention provides a PLD including a non-volatile permission memory block to enable a customer to utilize the core. In one embodiment, the core supplier designs its core to check for a specified permission bit or bit pattern in the permission memory block before the core will operate. If the permission bit or bit pattern is set properly, the core functions correctly when implemented in the PLD. If not, the core will not function.
To control the number of copies the customer can implement, the core supplier instructs the PLD manufacturer to give the customer a predetermined number of devices with the permission memory block set for the supplier's core. The manufacturer then sets the permission bits appropriately, and ships the devices to the customer. Because the supplier's core will only function if the device contains the appropriate permission bits, the supplier can be confident that the customer cannot make or use more copies than the number of appropriately set devices received from the manufacturer Thus, the supplier need not visit the customer to count the number of copies being made by the customer.
To prevent the customer from modifying the core such that it no longer depends upon the permission bits to function, the configuration bitstream used to program they PLD can be encrypted before and during transmission to the PLD. This encryption ensures security of the customer's logic design as well as the supplier's core design In this manner, the customer remains dependent upon properly set permission memory bits, i.e. proper permission, to obtain core functionality.


REFERENCES:
patent: 5838901 (1998-11-01), Curd et al.
patent: 5991880 (1999-11-01), Curd et al.
patent: 6086631 (2000-07-01), Chaudhary et al.
patent: 6094064 (2000-07-01), Mejia et al.
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6310956 (2001-10-01), Morito et al.
patent: 6331790 (2001-12-01), Or-Bach et al.
patent: 6525557 (2003-02-01), Mcmanus et al.
PLDs with processor cores enable browsable, configurable devices, Hoyer, B; Barrios, I; International IC—Taipei Conference Proceedings, 1998.*
CPU cores enable browsable PLDs, Hoyer, Bryan, Electronic Engineering Times, 96, Jul. 10, 2000.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Proprietary core permission structure and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Proprietary core permission structure and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Proprietary core permission structure and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3319410

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.