Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2007-01-09
2007-01-09
Barron, Gilberto (Department: 2137)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C726S008000, C326S008000
Reexamination Certificate
active
10112790
ABSTRACT:
Described are various methods and systems for encrypting/decrypting configuration data for programmable logic devices. In configuration data defining a number of separately encrypted subdesigns, or “cores,” each subdesign includes a shared password or a unique authentication code to ensure the designs belong together. Other embodiments prohibit the overwriting of configuration memory to prevent the inclusion of unauthorized designs. Still other embodiments protect key secrecy while enabling users to read, write, and verify the keys.
REFERENCES:
patent: 3849760 (1974-11-01), Endou et al.
patent: 4037214 (1977-07-01), Birney et al.
patent: 4757468 (1988-07-01), Domenik et al.
patent: 5084636 (1992-01-01), Yoneda
patent: 5091938 (1992-02-01), Thompson et al.
patent: 5121359 (1992-06-01), Steele
patent: RE34363 (1993-08-01), Freeman
patent: 5237218 (1993-08-01), Josephson et al.
patent: 5237219 (1993-08-01), Cliff
patent: 5321704 (1994-06-01), Erickson et al.
patent: 5327564 (1994-07-01), Little
patent: 5341034 (1994-08-01), Matthews
patent: 5343406 (1994-08-01), Freeman et al.
patent: 5349249 (1994-09-01), Chiang et al.
patent: 5375169 (1994-12-01), Seheidt et al.
patent: 5388157 (1995-02-01), Austin
patent: 5394031 (1995-02-01), Britton et al.
patent: 5442704 (1995-08-01), Holtey
patent: 5457408 (1995-10-01), Leung
patent: 5598424 (1997-01-01), Erickson et al.
patent: 5748740 (1998-05-01), Curry et al.
patent: 5768372 (1998-06-01), Sung et al.
patent: 5774544 (1998-06-01), Lee et al.
patent: 5838901 (1998-11-01), Curd et al.
patent: 5914616 (1999-06-01), Young et al.
patent: 5930826 (1999-07-01), Lee et al.
patent: 5933023 (1999-08-01), Young
patent: 6028445 (2000-02-01), Lawman
patent: 6049222 (2000-04-01), Lawman
patent: 6058477 (2000-05-01), Kusakabe et al.
patent: 6172520 (2001-01-01), Lawman et al.
patent: 6212639 (2001-04-01), Erickson et al.
patent: RE37195 (2001-05-01), Kean
patent: 6237124 (2001-05-01), Plants
patent: 6259791 (2001-07-01), Moore
patent: 6330668 (2001-12-01), Curiger et al.
patent: 6331784 (2001-12-01), Mason et al.
patent: 6356637 (2002-03-01), Garnett
patent: 6366117 (2002-04-01), Pang et al.
patent: 6441641 (2002-08-01), Pang et al.
patent: 6442092 (2002-08-01), Tomita
patent: 6473861 (2002-10-01), Stokes
patent: 6477677 (2002-11-01), Abiven et al.
patent: 6598161 (2003-07-01), Kluttz et al.
patent: 6636971 (2003-10-01), Loukianov
patent: 6662333 (2003-12-01), Zhang et al.
patent: 6785816 (2004-08-01), Kivimaki et al.
patent: 6883075 (2005-04-01), Lin et al.
patent: 6904527 (2005-06-01), Parlour et al.
patent: 6931128 (2005-08-01), Roberts
patent: 6931543 (2005-08-01), Pang et al.
patent: 6948026 (2005-09-01), Keays
patent: 2001/0015919 (2001-08-01), Kean
patent: 2001/0032318 (2001-10-01), Yip et al.
patent: 2001/0037458 (2001-11-01), Kean
patent: 2002/0018561 (2002-02-01), Emelko
patent: 2002/0059518 (2002-05-01), Smeets et al.
patent: 2002/0064282 (2002-05-01), Loukianov et al.
patent: 2002/0069257 (2002-06-01), Rigori et al.
patent: 2003/0091185 (2003-05-01), Swindlehurst et al.
patent: 0253530 (1987-06-01), None
patent: WO92/20157 (1992-11-01), None
patent: WO94/10754 (1993-11-01), None
patent: WO94/01867 (1994-01-01), None
Menezes et al., Handbook of Applied Cryptography, 1996, CRC PRess, pp. 338-363.
Xilinx Application Note, “Configuration Issues: Power-Up, Volatility, Security, Battery Back-Up”, By Peter Alfke, XAPP 092, Nov. 24, 1997 (Version 1.1).
Virtex Configuration Guide, published by Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Oct. 9, 2000 (Version 1.0).
Bruce Schneier “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Second Edition, Copyright 1996, published by John Wiley & Sons, Inc.; Chapter 9, pp. 193-194, Chapter 10, 200-203 and p. 216; Chapter 12, pp. 265-301, Chapter 15, pp. 360-361, p. 456 and 483-502.
Cahners EDN Access Web Page, “Cunning circuits confound crooks,” Oct. 12, 2000; pp. 1-8; http://www.ednmag.com/ednmag/reg/2000/10122000/21df2.htm.
Xilinx, Application Note, XAPP138, “Virtex FPGA Series Configuration and Readback”, published Oct. 4, 2000, available from Xilinx, Inc., 2100 Logic Drive, San Jose, California 95124.
Wolfgang Hoflich, Applications Note, “Using the XC4000 Readback Capability”, XAPP 015.000, 1993, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, pp. 8-37 to 8-44.
Ann Duncan, Application Note, “DES Encryption and Decryption on the XC6216”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, XAPP 106, Feb. 2, 1998 (version 1.0), pp. 1-7.
“XC9500 In-System Programmable CPLD Family”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Sep. 15, 1999 (version 5.0), pp. 1-16.
Product Specification, “XC18V00 Series of In-System Programmable Configuration PROMs”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Nov. 12, 2001, DS026, (version 3.0), pp. 1-19.
Advanced Product Specification, “XC9500XV Family High-Performance CPLD”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Jan. 15, 2001, DS049, (version 2.0), pp. 1-18.
“The Programmable Logic Data Book”, published 1998, pp. 4-46 through 4-59, available from Xilinx, Inc. 2100 Logic Drive, San Jose, CA 95124.
“The Programmable Logic Data Book”, published 1994, pp. 2-105, through 2-132, 2-231 through 2-235, available from Xilinx, Inc. 2100 Logic Drive, San Jose, CA 95124.
Menezes, A. J., et al., Handbook of Applied Cryptography, 1996, CRC Press, pp. 338-363.
Altera Corporation; Altera.com; “The Advantage of Hard Subsystems in Embedded Processor PLDs” (Mar. 4, 2002) Altera Whitepaper available at http://www.altera.com/corporate
ews—room/release/release—archive/2002/products
r-emb—wp.html.
Johnson, Mark G.; “Encryption Code (three different sources)” Jan. 18, 1991. usenet:sci.crypt. Relevant code on p. 20 of printout.
Cristiano, Paris; “Burn! Burn it all!” Oct. 7, 1996. usenet: sci.crypt.
Dipert, Brian; “Cunning Circuits Confound Crooks,” Oct. 12, 2000. Cahners EDN Access.
Hamalainen et al.; “Configurable Hardware Implementation of Triple-DES Encryption Algorithm For Wireless Local Area Network”, May 2001; IEEE Proceedings, (ICASSP '01) vol. 2, May 7-11, 2001, pp. 1221-1224, vol. 2.
Schneier, Burce; “Applied Cyptography” 1996. John Wiley & Sons pp. 283-284, 360.
National Institute of Standards and Technology“Announcing Draft Federal Information Processing Standard (FIPS) 46-3, Data Encryption Standar (DES), and Request for Comments”, Jan. 15, 1999.
Rubin et al., “What Do You Do With Boken Crypto Hardware?” Jan. 25, 2001, pp. 1-4. usenet:sci.crypt.
Altera, Inc., “Altera Publishes White Paper on Hard Subsystems in Embedded Processor PLDs”, Mar. 4, 2002, Http://www.altera.com/corporate
ews—room/releases—archive/2002/products
r-emb—wp.html.
Menezes, A. J., et al., Handbook of Applied Cryptography, 1996, CRC Press, pp. 578-581.
Barron Gilberto
Behiel Arthur J.
Maunu LeRoy D.
Nguyen Minh Dieu
Xilinx , Inc.
LandOfFree
Methods and circuits for protecting proprietary... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and circuits for protecting proprietary..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and circuits for protecting proprietary... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3762562