Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of Actively Tagging Electronic Designs and Intellectual Property Cores

a technology of electronic design and intellectual property core, applied in the direction of subscriber station connection selection arrangement, internal/peripheral component protection, indirect connection, etc., can solve the problem that it is expensive and time-consuming to determine whether a particular product is suitable, and the difficulty of obtaining evidence of wrongdoing is even greater, so as to achieve the effect of convenient and cost-effective determination

Inactive Publication Date: 2011-09-01
ALGOTRONIX
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This solution reduces the need for costly physical analysis, allows detection of IP Core presence even in encrypted FPGAs, and makes it difficult for unauthorized users to detect and remove the tagging component, providing reliable evidence of IP usage and facilitating version control and failure analysis.

Problems solved by technology

unscrupulous equipment manufacturers may abuse the intellectual property rights of designers by making use of their designs without permission.
A problem faced by owners of such design information, seeking to police abuse of their intellectual property rights, is that it is costly and time consuming to determine whether a particular product does in fact contain the proprietary design fragment.
In the case of FPGA designs where the bitstream is encrypted or programmed into antifuse FPGAs, where the state of the anti-fuses is almost impossible to determine even by microscopic analysis, the difficulty of obtaining evidence of wrongdoing is even greater.
This system is not perfect because chip packages are becoming smaller, which limits the amount of information that can be printed.
Some package materials do not lend themselves to legible printing.
In some cases companies deliberately remove markings or ask for unmarked devices in order to make it difficult for competitors to determine which chips have been used in their system.
At a practical level it can be difficult to decipher the markings on the top of chip packages.
The industry around licensing IP Cores is still relatively young so there has been little work specifically on detecting the use of IP cores within a larger design.
In the case where the bitstream cannot be recovered because it is encrypted or programmed into an antifuse or FLASH based FPGA bitstream, analysis techniques would be useless.
Conventional reverse engineering services which conduct an analysis of the physical interconnects on the integrated circuit are also of no help in the FPGA case, because the IP core design cannot be determined by analysing the mask work of the FPGA it is configured into.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of Actively Tagging Electronic Designs and Intellectual Property Cores
  • Method of Actively Tagging Electronic Designs and Intellectual Property Cores
  • Method of Actively Tagging Electronic Designs and Intellectual Property Cores

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]Turning to FIG. 1, in one novel aspect of an embodiment of the invention a security tag design fragment 100 is disclosed, which creates a covert channel 110 between itself and detection equipment 120 located outside an integrated circuit 130. This integrated circuit 130, containing the security tag 100, is then incorporated in a piece of electronic equipment 140. By connecting detection equipment 120 to the electronic equipment 140, (or in some cases merely positioning a sensor from the detection equipment 120 near the electronic equipment 140) the security tag 100 creates a covert communications channel 110 between itself and the detection equipment 120, which allows the detection equipment 120 to determine that the security tag 100 is present.

[0025]Although the security tag 100 is shown in FIG. 1 as being added to an IP core 150, by the IP core vendor, a designer of a complete chip (rather than an IP core 150 design fragment) could also use a security tag 100 on the chip 130...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In an embodiment of the invention, an active security tag is embedded within the digital logic of an electronic design for logic destined for an integrated circuit such as an FPGA. The security tag includes security tag data which permits identification of the electronic design, and facilitates efforts to enforce copyrights in the designs. The security tag also includes a transmitter designed to covertly transmit security tag data to a receiver. Other information, such as error information and status information about the integrated circuit may also be transmitted. The transmitted information is concealed from detection by being hidden within background noise signals or other signals created by normal usage of the integrated circuit.

Description

[0001]This application is a continuation of co-pending U.S. application Ser. No. 11 / 852,205 filed on Sep. 7, 2007, which claims the benefit of United Kingdom Patent Application Serial No. GB 0617697.8, titled “Method of Actively Tagging Electronic Designs and Intellectual Property Cores”, filed Sep. 8, 2006, all of which is fully incorporated herein by reference.FIELD OF THE INVENTION[0002]This invention relates to the labeling and protection of electronic design information, particularly electronic design fragments that are sold as Intellectual Property Cores (IP Cores) to be incorporated in larger customer designs.BACKGROUND OF THE INVENTION[0003]unscrupulous equipment manufacturers may abuse the intellectual property rights of designers by making use of their designs without permission. Examples of such illegal activity include:[0004]1. Copying FPGA bitstream information from a competitor' product and using it to configure the same kind of FPGA in one's own product.[0005]2. When ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04Q5/22G06F21/76
CPCH04K1/02G06F21/76H01L23/544G06F30/34
Inventor KEAN, THOMAS A.
Owner ALGOTRONIX