Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2006-11-07
2006-11-07
Song, Hosuk (Department: 2135)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S165000, C713S167000, C713S193000, C711S154000, C711S155000, C711S163000
Reexamination Certificate
active
07134025
ABSTRACT:
Described are various methods and systems for protecting proprietary configuration data for programmable logic devices. In one example, frames of configuration memory include overwrite-protect circuitry that reduces the risks associated with Trojan Horse attacks by preventing the overwriting of frames between device resets.
REFERENCES:
patent: 3849760 (1974-11-01), Endou et al.
patent: 4037214 (1977-07-01), Birney et al.
patent: 4757468 (1988-07-01), Domenik et al.
patent: 5084636 (1992-01-01), Yoneda
patent: 5091938 (1992-02-01), Thompson et al.
patent: 5121359 (1992-06-01), Steele
patent: RE34363 (1993-08-01), Freeman
patent: 5237218 (1993-08-01), Josephson et al.
patent: 5237219 (1993-08-01), Cliff
patent: 5321704 (1994-06-01), Erickson et al.
patent: 5327564 (1994-07-01), Little
patent: 5336950 (1994-08-01), Popli et al.
patent: 5341034 (1994-08-01), Matthews
patent: 5343406 (1994-08-01), Freeman et al.
patent: 5349249 (1994-09-01), Chiang et al.
patent: 5375169 (1994-12-01), Seheidt et al.
patent: 5388157 (1995-02-01), Austin
patent: 5394031 (1995-02-01), Britton et al.
patent: 5442704 (1995-08-01), Holtey
patent: 5457408 (1995-10-01), Leung
patent: 5598424 (1997-01-01), Erickson et al.
patent: 5748740 (1998-05-01), Curry et al.
patent: 5768372 (1998-06-01), Sung et al.
patent: 5774544 (1998-06-01), Lee et al.
patent: 5838901 (1998-11-01), Curd et al.
patent: 5914616 (1999-06-01), Young et al.
patent: 5930826 (1999-07-01), Lee et al.
patent: 5933023 (1999-08-01), Young
patent: 6028445 (2000-02-01), Lawman
patent: 6049222 (2000-04-01), Lawman
patent: 6058477 (2000-05-01), Kusakabe et al.
patent: 6172520 (2001-01-01), Lawman et al.
patent: 6212639 (2001-04-01), Erickson et al.
patent: RE37195 (2001-05-01), Kean
patent: 6237124 (2001-05-01), Plants
patent: 6255849 (2001-07-01), Mohan
patent: 6259791 (2001-07-01), Moore
patent: 6330668 (2001-12-01), Curiger et al.
patent: 6331784 (2001-12-01), Mason et al.
patent: 6336176 (2002-01-01), Leyda et al.
patent: 6356637 (2002-03-01), Garnett
patent: 6366117 (2002-04-01), Pang et al.
patent: 6441641 (2002-08-01), Pang et al.
patent: 6442092 (2002-08-01), Tomita
patent: 6473861 (2002-10-01), Stokes
patent: 6477677 (2002-11-01), Abiven et al.
patent: 6598161 (2003-07-01), Kluttz et al.
patent: 6615329 (2003-09-01), Scott et al.
patent: 6636971 (2003-10-01), Loukianov
patent: 6662333 (2003-12-01), Zhang et al.
patent: 6785816 (2004-08-01), Kivimaki et al.
patent: 6883075 (2005-04-01), Lin et al.
patent: 6904527 (2005-06-01), Parlour et al.
patent: 6931128 (2005-08-01), Roberts
patent: 6931543 (2005-08-01), Pang et al.
patent: 6948026 (2005-09-01), Keays
patent: 2001/0015919 (2001-08-01), Kean
patent: 2001/0032318 (2001-10-01), Yip et al.
patent: 2001/0037458 (2001-11-01), Kean
patent: 2002/0018561 (2002-02-01), Emelko
patent: 2002/0059518 (2002-05-01), Smeets et al.
patent: 2002/0064282 (2002-05-01), Loukianov et al.
patent: 2002/0069257 (2002-06-01), Rigori et al.
patent: 2003/0091185 (2003-05-01), Swindlehurst et al.
patent: 0253530 (1987-06-01), None
patent: WO92/20157 (1992-11-01), None
patent: WO94/10754 (1993-11-01), None
patent: WO94/01867 (1994-01-01), None
Xilinx Application Note, “Configuration Issues: Power-Up, Volatility, Security, Battery Back-Up”, By Peter Alfke, XAPP 092, Nov. 24, 1997 (Version 1.1).
Virtex Configuration Guide, published by Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Oct. 9, 2000 (Version 1.0).
Bruce Schneier “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Second Edition, Copyright 1996, published by John Wiley & Sons, Inc.; Chapter 9, pp. 193-194, Chapter 10, 200-203 and p. 216; Chapter 12, pp. 265-301, Chapter 15, pp. 360-361, p. 456 and 483-502.
Cahners EDN ACCESS Web Page, “Cunning circuits confound crooks,” Oct. 12, 2000; pp. 1-8; http://www.ednmag.com/ednmag/reg/2000/10122000/21df2.htm.
Xilinx, Application Note, XAPP138, “Virtex FPGA Series Configuration and Readback”, published Oct. 4, 2000, available from Xilinx, Inc., 2100 Logic Drive, San Jose, California 95124.
Wolfgang Hoflich, Applications Note, “Using the XC4000 Readback Capability”, XAPP 015.000, 1993, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, pp. 8-37 to 8-44.
Ann Duncan, Application Note, “DES Encryption and Decryption on the XC6216”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, XAPP 106, Feb. 2, 1998 (version 1.0), pp. 1-7.
“XC9500 In-System Programmable CPLD Family”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Sep. 15, 1999 (version 5.0), pp. 1-16.
Product Specification, “XC18V00 Series of In-System Programmable Configuration PROMs”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Nov. 12, 2001, DS026, (version 3.0), pp. 1-19.
Advanced Product Specification, “XC9500XV Family High-Performance CPLD”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Jan. 15, 2001, DS049, (version 2.0), pp. 1-18.
“The Programmable Logic Data Book”, published 1998, pp. 4-46 through 4-59, available from Xilinx, Inc. 2100 Logic Drive, San Jose, CA 95124.
“The Programmable Logic Data Book”, published 1994, pp. 2-105, through 2-132, 2-231 through 2-235, available from Xilinx, Inc. 2100 Logic Drive, San Jose, CA 95124.
Menezes, A. J., et al., Handbook of Applied Cryptography, 1996, CRC Press, pp. 338-363.
Altera Corporation; Altera.com; “The Advantage of Hard Subsystems in Embedded Processor PLDs” (Mar. 4, 2002) Altera Whitepaper available at http://www.altera.com/corporate
ews—room/releases/releases—archive/2002/products
r-emb—wp.html.
Johnson, Mark G.; “Encryption Code (three different sources)” Jan. 18, 1991. usenet:sci.crypt. Relevant code on p. 20 of printout.
Cristiano, Paris; “Burn! Burn it all!” Oct. 7, 1996. usenet: sci.crypt.
Dipert, Brian; “Cunning Circuits Confound Crooks,” Oct. 12, 2000, Cahners EDN Access.
Hamalainen et al.; “Configurable Hardware Implementation of Triple-DES Encryption Algorithm For Wireless Local Area Network”, May 2001; IEEE Proceedings, (ICASSP '01) vol. 2, May 7-11, 2001, pp. 1221-1224, vol. 2.
Schneier, Bruce; “Applied Cyptography” 1996. John Wiley & Sons pp. 283-284, 360.
National Institute of Standards and Technology “Announcing Draft Federal Information Processing Standard (FIPS) 46-3, Data Encryption Standar (DES), and Request for Comments”, Jan. 15, 1999.
Rubin, Paul et al., “What Do You Do With Boken Crypto Hardware?” Jan. 25, 2001, pp. 1-4. usenet:sci.crypt.
Altera, Inc., “Altera Publishes White Paper on Hard Subsystems in Embedded Processor PLDs”, Mar. 4, 2002, Http://www.altera.com/corporate
ews—room/release—archive/2002/products
r-emb—wp.html.
Menezes, A. J., et al., Handbook of Applied Cryptography, 1996, CRC Press, pp. 578-581.
Behiel Arthur J.
Dada Beemnet W
Maunu LeRoy D.
Song Hosuk
Xilinx , Inc.
LandOfFree
Methods and circuits for preventing the overwriting of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and circuits for preventing the overwriting of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and circuits for preventing the overwriting of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3675627