A method to enhance the security of secondary radar fpga
A secondary radar and security technology, applied in the direction of climate sustainability, encryption device with shift register/memory, user identity/authority verification, etc., can solve the problem of the small number of secondary radars, the maintenance cost of the designer, and later spare parts Loss of economic benefits, high design cost and hardware flexibility requirements, etc., to achieve low cost, prevent leakage, and prevent copying
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.
[0029] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.
[0030] 1 Multiple Configuration Technology
[0031] The multi-configuration technology is a technology that stores two or more configuration files in the configuration memory chip and is triggered by the FPGA itself for reconfiguration. The reconfiguration address and mode can be set in ISE or in the reconfiguration command. After receiving the reconfiguration control command, the FPGA sends a reconfiguration command through interfaces such ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


