Method of Actively Tagging Electronic Designs and Intellectual Property Cores
a technology of electronic design and intellectual property core, applied in the direction of subscriber station connection selection arrangement, internal/peripheral component protection, indirect connection, etc., can solve the problem that it is expensive and time-consuming to determine whether a particular product is suitable, and the difficulty of obtaining evidence of wrongdoing is even greater, so as to achieve the effect of convenient and cost-effective determination
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024]Turning to FIG. 1, in one novel aspect of an embodiment of the invention a security tag design fragment 100 is disclosed, which creates a covert channel 110 between itself and detection equipment 120 located outside an integrated circuit 130. This integrated circuit 130, containing the security tag 100, is then incorporated in a piece of electronic equipment 140. By connecting detection equipment 120 to the electronic equipment 140, (or in some cases merely positioning a sensor from the detection equipment 120 near the electronic equipment 140) the security tag 100 creates a covert communications channel 110 between itself and the detection equipment 120, which allows the detection equipment 120 to determine that the security tag 100 is present.
[0025]Although the security tag 100 is shown in FIG. 1 as being added to an IP core 150, by the IP core vendor, a designer of a complete chip (rather than an IP core 150 design fragment) could also use a security tag 100 on the chip 130...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


