Secure programmable logic device

Electronic digital logic circuitry – Security

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C326S037000, C713S152000, C711S163000

Reexamination Certificate

active

06331784

ABSTRACT:

TECHNICAL FIELD
The present invention relates to SRAM-based programmable logic integrated circuits, such as field programmable gate arrays (FPGAs), in which the configuration code defining the logic circuit's programmed functionality is loaded from a configuration memory or microcontroller into the logic circuit at power up. The invention relates in particular to schemes for protecting the contents of the configuration memory from copying.
BACKGROUND ART
As programmable logic integrated circuits become denser, cheaper and faster, they are increasingly being used in high production volume designs that historically have instead employed gate array or standard cell ASIC. This transition to programmable logic circuitry creates opportunities for design theft which do not occur with ASICs to the same extent. Design theft is of special concern with SRAM-based chips that power up “unconfigured” and must be loaded from a separate configuration memory. The problem with these devices from a security standpoint is that SRAM-based programmable logic circuitry, such as many FPGAs, lose their programmed configuration on power down. Each time a SRAM-based FPGA is powered up, a bit stream is loaded into the device from an external memory source, which is usually a non-volatile memory chip, such as an EPROM or EEPROM, or sometimes a microcontroller.
FIG. 1
illustrates a typical unsecured system of the prior art. Programmable logic
11
and configuration memory
13
(or microcontroller) chip packages are both mounted on a printed circuit board
15
with a data connection
17
between them so that configuration data can be loaded into the programmable logic
11
on power up. The external memory device
13
is a unsecured device that is easily removed from the board. Using a commercial programmer, the contents of the memory device
13
can be read and copied. Alternatively, the data line
17
and the memory's external pins
19
form a unsecured link in which the configuration bitstream can be read as the data is transferred into the programmable device
11
by placing a probe on the printed circuit board trace
17
or the device pins
19
and using a logic analyzer to capture the data. Once captured the data can be readily duplicated, allowing theft of whole circuit designs.
Antifuse, EEPROM and flash memory-based devices also aren't immune from reverse-engineering or duplication. If the design is valuable enough, a clever cracker will strive mightily to figure out a way to extract it. High voltage application on external pins to put the part into a test mode, and die probing, are some of the techniques used here.
Because unscrupulous systems manufacturers exist who ignore all valid copyright and patent claims to a circuit design, or are insulated by weak intellectual property laws in some countries, and will not hesitate to copy new circuit designs in the rush to make a quick profit, it is increasingly desirable to find ways to secure the contents of the configuration memory.
Presently, security schemes involve a combination of a security bit in the memory devices and encryption of the serial data stream being transferred to the programmable logic. Such techniques are described in U.S. Pat. Nos. 4,812,675; 4,852,044; 5,349,249; 5,388,157; 5,446,864; 5,640,347; 5,768,372; 5,915,017; and 5,970,142. However, while a security bit is easily implemented, encryption of the data stream adds complexity and cost to both the memory chip and the target programmable device.
An object of the invention is to provide a simpler and less costly way to secure configuration data from dishonest manufacturers.
DISCLOSURE OF THE INVENTION
The object is met by combining the use of a security bit for the configuration memory with the incorporation of both memory and programmable logic chips in a single package. Use of a multi-chip module internalizes the data transfer from the memory to the logic chip so that it cannot be probed without disassembling the package. The security bit prevents read out of the configuration memory contents through the module's external pins.


REFERENCES:
patent: 4812675 (1989-03-01), Goetting
patent: 4852044 (1989-07-01), Turner et al.
patent: 4972105 (1990-11-01), Burton et al.
patent: 5349249 (1994-09-01), Chiang et al.
patent: 5388157 (1995-02-01), Austin
patent: 5446864 (1995-08-01), Burghardt et al.
patent: 5450022 (1995-09-01), New
patent: 5640107 (1997-06-01), Kruse
patent: 5640347 (1997-06-01), Lin et al.
patent: 5768372 (1998-06-01), Sung et al.
patent: 5915017 (1999-06-01), Sung et al.
patent: 5954817 (1999-09-01), Janssen et al.
patent: 5970142 (1999-10-01), Erickson
patent: 6088262 (2000-07-01), Nasu
patent: 6100714 (2000-08-01), Xiao et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure programmable logic device does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure programmable logic device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure programmable logic device will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2588653

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.