Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2007-05-15
2007-05-15
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C711S152000, C711S164000, C380S277000
Reexamination Certificate
active
10150192
ABSTRACT:
Described are various methods and systems for preventing unauthorized access to decryption keys on programmable logic devices. In one example, a key memory can operate in a secure mode or a non-secure mode. The non-secure mode allows decryption keys to be read or written freely; the secure mode bars read and write access to the decryption keys. The key memory can support secure and non-secure modes on a key-by-key basis.
REFERENCES:
patent: 3849760 (1974-11-01), Endou et al.
patent: 4037214 (1977-07-01), Birney et al.
patent: 4757468 (1988-07-01), Domenik et al.
patent: 5084636 (1992-01-01), Yoneda
patent: 5091938 (1992-02-01), Thompson et al.
patent: 5121359 (1992-06-01), Steele
patent: RE34363 (1993-08-01), Freeman
patent: 5237218 (1993-08-01), Josephson et al.
patent: 5237219 (1993-08-01), Cliff
patent: 5293424 (1994-03-01), Holtey et al.
patent: 5321704 (1994-06-01), Erickson et al.
patent: 5327564 (1994-07-01), Little
patent: 5341034 (1994-08-01), Matthews
patent: 5343406 (1994-08-01), Freeman et al.
patent: 5349249 (1994-09-01), Chiang et al.
patent: 5375169 (1994-12-01), Seheidt et al.
patent: 5388157 (1995-02-01), Austin
patent: 5394031 (1995-02-01), Britton et al.
patent: 5442704 (1995-08-01), Holtey
patent: 5457408 (1995-10-01), Leung
patent: 5594793 (1997-01-01), Bahout
patent: 5598424 (1997-01-01), Erickson et al.
patent: 5748740 (1998-05-01), Curry et al.
patent: 5768372 (1998-06-01), Sung et al.
patent: 5774544 (1998-06-01), Lee et al.
patent: 5838901 (1998-11-01), Curd et al.
patent: 5914616 (1999-06-01), Young et al.
patent: 5930826 (1999-07-01), Lee et al.
patent: 5933023 (1999-08-01), Young
patent: 6028445 (2000-02-01), Lawman
patent: 6049222 (2000-04-01), Lawman
patent: 6058477 (2000-05-01), Kusakabe et al.
patent: 6118869 (2000-09-01), Kelem et al.
patent: 6172520 (2001-01-01), Lawman et al.
patent: 6212639 (2001-04-01), Erickson et al.
patent: RE37195 (2001-05-01), Kean
patent: 6237124 (2001-05-01), Plants
patent: 6259791 (2001-07-01), Moore
patent: 6305005 (2001-10-01), Burnham
patent: 6324676 (2001-11-01), Burnham et al.
patent: 6330668 (2001-12-01), Curiger et al.
patent: 6331784 (2001-12-01), Mason et al.
patent: 6356637 (2002-03-01), Garnett
patent: 6366117 (2002-04-01), Pang et al.
patent: 6441641 (2002-08-01), Pang et al.
patent: 6442092 (2002-08-01), Tomita
patent: 6473861 (2002-10-01), Stokes
patent: 6477677 (2002-11-01), Abiven et al.
patent: 6598161 (2003-07-01), Kluttz et al.
patent: 6636971 (2003-10-01), Loukianov
patent: 6662333 (2003-12-01), Zhang et al.
patent: 6785816 (2004-08-01), Kivimaki et al.
patent: 6823069 (2004-11-01), Kitajima et al.
patent: 6883075 (2005-04-01), Lin et al.
patent: 6904527 (2005-06-01), Parlour et al.
patent: 6931128 (2005-08-01), Roberts
patent: 6931543 (2005-08-01), Pang et al.
patent: 6948026 (2005-09-01), Keays
patent: 6957340 (2005-10-01), Pang et al.
patent: 2001/0015919 (2001-08-01), Kean
patent: 2001/0032318 (2001-10-01), Yip et al.
patent: 2001/0037458 (2001-11-01), Kean
patent: 2002/0018561 (2002-02-01), Emelko
patent: 2002/0059518 (2002-05-01), Smeets et al.
patent: 2002/0064282 (2002-05-01), Loukianov et al.
patent: 2002/0069257 (2002-06-01), Rigori et al.
patent: 2003/0091185 (2003-05-01), Swindlehurst et al.
patent: 0253530 (1987-06-01), None
patent: WO92/20157 (1992-11-01), None
patent: WO94/10754 (1993-11-01), None
patent: WO94/01867 (1994-01-01), None
Xilinx Application Note, “Configuration Issues: Power-Up, Volatility, Security, Battery Back-Up”, By Peter Alfke, XAPP 092, Nov. 24, 1997 (Version 1.1).
Virtex Configuration Guide, published by Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Oct. 9, 2000 (Version 1.0).
Bruce Schneier “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Second Edition, Copyright 1996, published by John Wiley & Sons, Inc.; Chapter 9, pp. 193-194, Chapter 10, 200-203 and p. 216; Chapter 12, pp. 265-301, Chapter 15, pp. 360-361, p. 456 and 483-502.
Cahners EDN Access Web Page, “Cunning circuits confound crooks,” Oct. 12, 2000; pp. 1-8; http://www.ednmag.com/ednmag/reg/2000/10122000/21df2.htm.
Xilinx, Application Note, XAPP138, “Virtex FPGA Series Configuration and Readback”, published Oct. 4, 2000, available from Xilinx, Inc., 2100 Logic Drive, San Jose, California 95124.
Wolfgang Hoflich, Applications Note, “Using the XC4000 Readback Capability”, XAPP 015.000, 1993, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, pp. 8-37 to 8-44.
Ann Duncan, Application Note, “DES Encryption and Decryption on the XC6216”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, XAPP 106, Feb. 2, 1998 (version 1.0), pp. 1-7.
“XC9500 In-System Programmable CPLD Family”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Sep. 15, 1999 (version 5.0), pp. 1-16.
Product Specification, “XC18V00 Series of In-System Programmable Configuration PROMs”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Nov. 12, 2001, DS026, (version 3.0), pp. 1-19.
Advanced Product Specification, “XC9500XV Family High-Performance CPLD”, available from Xilinx, Inc., 2100 Logic Drive, San Jose, CA 95124, Jan. 15, 2001, DS049, (version 2.0), pp. 1-18.
“The Programmable Logic Data Book”, published 1998, pp. 4-46 through 4-59, available from Xilinx, Inc. 2100 Logic Drive, San Jose, CA 95124.
“The Programmable Logic Data Book”, published 1994, pp. 2-105, through 2-132, 2-231 through 2-235, available from Xilinx, Inc. 2100 Logic Drive, San Jose, CA 95124.
Menezes, A. J., et al., Handbook of Applied Cryptography, 1996, CRC Press, pp. 338-363.
Altera Corporation; Altera.com; “The Advantages of Hard Subsystems in Embedded Processor PLDs” (Mar. 4, 2002) Altera Whitepaper available at http://www.altera.com/corporate
ews—room/releases/releases—archive/2002/products
r-emb—wp.html.
Johnson, Mark G.; “Encryption Code (three different sources)” Jan. 18, 1991. usenet:sci.crypt. Relevant code on p. 20 of printout.
Cristiano, Paris; “Burn! Burn it all!” Oct. 7, 1996. usenet: sci.crypt.
Dipert, Brian; “Cunning Circuits Confound Crooks,” Oct. 12, 2000. Cahners EDN Access.
Hamalainen et al.; “Configurable Hardware Implementation of Triple-DES Encryption Algorithm For Wireless Local Area Network”, May 2001; IEEE Proceedings, (ICASSP '01) vol. 2, May 7-11, 2001, pp. 1221-1224, vol. 2.
Schneier, Bruce; “Applied Cyptography” 1996. John Wiley & Sons pp. 283-284, 360.
National Institute of Standards and Technology “Announcing Draft Federal Information Processing Standard (FIPS) 46-3, Data Encryption Standar (DES), and Request for Comments”, Jan. 15, 1999.
Rubin, Paul et al., “What Do You Do With Boken Crypto Hardware?” Jan. 25, 2001, pp. 1-4. usenet:sci.crypt.
Altera, Inc., “Altera Publishes White Paper on Hard Subsystems in Embedded Processor PLDs”, Mar. 4, 2002, Http://www.altera.com/corporate
ews—room/releases—archive/2002/products
r-emb—wp.html.
Menezes, A. J., et al., Handbook of Applied Cryptography, 1996, CRC Press, pp. 578-581.
Abedin Shanto M Z
Maunu LeRoy D.
Moazzami Nasser
Xilinx , Inc.
LandOfFree
Read- and write-access control circuits for decryption-key... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Read- and write-access control circuits for decryption-key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Read- and write-access control circuits for decryption-key... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3752896