会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Trust controller for detecting unauthorized logic in a circuit design
    • 用于在电路设计中检测未授权逻辑的信任控制器
    • US07656189B1
    • 2010-02-02
    • US11888198
    • 2007-07-31
    • Stephen M. Trimberger
    • Stephen M. Trimberger
    • G06F7/38H03K19/173H01L25/00
    • H03K19/17768G06F21/76
    • Various approaches for detection of an unwanted function implemented in an integrated circuit (IC) are described. A controller is implemented on the IC, and at a first time while the IC is operating according to a circuit design, the controller reads a first data set from a subset of memory cells. The subset of memory cells stores state information of the circuit design. The controller determines whether the first data set is different from a second data set. In response to the first data set being different from the second data set, the controller outputs a threat signal that indicates the presence of unauthorized logic in the circuit design.
    • 描述用于检测集成电路(IC)中实现的不期望功能的各种方法。 在IC上实现控制器,并且当IC根据电路设计操作时,第一时间,控制器从存储器单元的子集读取第一数据集。 存储器单元的子集存储电路设计的状态信息。 控制器确定第一数据集是否与第二数据集不同。 响应于第一数据集与第二数据集不同,控制器输出指示电路设计中存在未授权逻辑的威胁信号。
    • 22. 发明授权
    • Methods of detecting unwanted logic in an operational circuit design
    • 在操作电路设计中检测不需要的逻辑的方法
    • US07590956B1
    • 2009-09-15
    • US11818007
    • 2007-06-13
    • Stephen M. Trimberger
    • Stephen M. Trimberger
    • G06F17/50
    • G06F17/5045G06F17/5054G06F2217/10G06F2217/14G06F2217/78
    • Methods of detecting unwanted logic in an integrated circuit (IC) design. Any unwanted logic added to a design (e.g., to monitor or interfere with operation of the design) will draw power from one or more power supplies on the IC. Hence, by monitoring power drawn from various portions of a circuit design implemented in an IC, the unwanted logic can be detected and reported to the user. One way of monitoring power draw is by the use of oscillator circuits. If power goes down locally (e.g., due to the operation of unwanted logic), the frequency of an oscillator circuit in that vicinity will be reduced relative to the frequencies of other oscillator circuits in the design, and/or relative to an expected value. When a variation in the relative power consumption is detected, unwanted logic can be inferred and an error signal is output.
    • 在集成电路(IC)设计中检测不需要的逻辑的方法。 添加到设计中的任何不想要的逻辑(例如,监视或干扰设计的操作)将从IC上的一个或多个电源获取电力。 因此,通过监视从IC中实现的电路设计的各个部分获得的功率,可以检测并且向用户报告不需要的逻辑。 监控功率的一种方法是使用振荡器电路。 如果电力局部下降(例如,由于不需要的逻辑的操作),则相邻的振荡器电路的频率将相对于设计中的其它振荡器电路的频率和/或相对于期望值而减小。 当检测到相对功率消耗的变化时,可以推断出不需要的逻辑并输出误差信号。
    • 23. 发明授权
    • Copy protection without non-volatile memory
    • 复制保护,不带非易失性存储器
    • US07380131B1
    • 2008-05-27
    • US09765907
    • 2001-01-19
    • Stephen M. Trimberger
    • Stephen M. Trimberger
    • H04L9/00
    • H04L9/0866
    • An FPGA includes a plurality of configurable logic elements, a configuration circuit, a decryption circuit, and a fingerprint element. The fingerprint element generates a fingerprint that is indicative of inherent manufacturing process variations unique to the FPGA. The fingerprint is used as a key for an encryption system that protects against illegal use and/or copying of configuration data. In some embodiments, the propagation delay of various circuit elements formed on the FPGA are used to generate the fingerprint. In one embodiment, the specific frequency of an oscillator is used to generate the fingerprint. In some embodiments, a ratio of measurable values may be used to generate the fingerprint. In other embodiments, differences in transistor threshold voltages are used to generate the fingerprint. In still other embodiments, variations in line widths are used to generate the fingerprint.
    • FPGA包括多个可配置逻辑元件,配置电路,解密电路和指纹元件。 指纹元件产生指示,其指示FPGA独有的固有制造工艺变化。 该指纹被用作加密系统的关键,防止非法使用和/或复制配置数据。 在一些实施例中,形成在FPGA上的各种电路元件的传播延迟用于生成指纹。 在一个实施例中,使用振荡器的特定频率来产生指纹。 在一些实施例中,可以使用可测量值的比率来生成指纹。 在其他实施例中,晶体管阈值电压的差异被用于生成指纹。 在其他实施例中,使用线宽的变化来生成指纹。
    • 24. 发明授权
    • Methods of providing error correction in configuration bitstreams for programmable logic devices
    • 在可编程逻辑器件的配置比特流中提供纠错的方法
    • US07254800B1
    • 2007-08-07
    • US10787683
    • 2004-02-26
    • Stephen M. Trimberger
    • Stephen M. Trimberger
    • G06F17/50H03K17/693
    • G06F17/5054
    • Methods of providing error correction in configuration bitstreams for programmable logic devices (PLDs). While any error correction method can be used, in one embodiment a Hamming code is applied to instructions in the configuration bitstream, while a product code is applied to configuration data. Thus, the higher overhead required for a Hamming code applies to only a few words in the bitstream. The instructions are corrected on receipt of the word that includes the Hamming code, so the instructions are executed correctly even if a transmission error has occurred. However, configuration data can be stored in the configuration memory without correction. With a product code, the exact location of an erroneous bit is not known until the end of the transmission, when a parity word is received. At this time, the PLD can go back and correct erroneous bits in the configuration data prior to enabling the newly loaded design.
    • 在可编程逻辑器件(PLD)的配置比特流中提供纠错的方法。 虽然可以使用任何纠错方法,但是在一个实施例中,将汉明码应用于配置比特流中的指令,同时将产品代码应用于配置数据。 因此,汉明码所需的较高开销仅适用于比特流中的几个字。 在接收到包含汉明码的单词时纠正指令,因此即使发生传输错误,指令也能正确执行。 然而,配置数据可以存储在配置存储器中而不进行校正。 使用产品代码,当接收到奇偶校验字时,直到发送结束,才知道错误位的确切位置。 此时,在启用新加载的设计之前,PLD可以返回并纠正配置数据中的错误位。
    • 26. 发明授权
    • Integrated circuit with circuitry for overriding a defective configuration memory cell
    • 具有用于覆盖缺陷配置存储单元的电路的集成电路
    • US07187597B1
    • 2007-03-06
    • US11218415
    • 2005-09-01
    • Stephen M. Trimberger
    • Stephen M. Trimberger
    • G11C7/00G11C8/00
    • G11C8/10G11C5/063G11C29/24G11C29/816G11C29/846
    • An integrated circuit and a method for configuring programmable logic thereof are described. A data register and an address register are coupled to an array of memory cells of the integrated circuit. Address storage is configurable for storing an address associated configuration data targeted for being written to at least one defective memory cell of the array of memory cells. Data storage is configured to store the configuration data associated with the at least one defective memory cell. A controller is configured to cause the address to be loaded into the address register and the configuration data to be loaded into the data register. The controller is configured to maintain a write state for continually writing the configuration data to the array of memory cells responsive to the address during operation of the integrated circuit.
    • 描述了用于配置其可编程逻辑的集成电路和方法。 数据寄存器和地址寄存器耦合到集成电路的存储单元阵列。 地址存储器可配置为存储针对要写入到存储器单元阵列的至少一个有缺陷的存储器单元的地址相关联的配置数据。 数据存储被配置为存储与至少一个有缺陷的存储器单元相关联的配置数据。 控制器被配置为使得地址被加载到地址寄存器中,并且配置数据被加载到数据寄存器中。 控制器被配置为保持写入状态,以响应于在集成电路的操作期间的地址,将配置数据连续地写入存储器单元阵列。
    • 29. 发明授权
    • Bitstream compression with don't care values
    • 比特流压缩与不关心的价值
    • US07103685B1
    • 2006-09-05
    • US10759755
    • 2004-01-16
    • Stephen M. Trimberger
    • Stephen M. Trimberger
    • G06F13/00
    • H03M7/3084G06F17/5054
    • A method and system for processing a plurality of multi-bit configuration words for configuring a programmable logic device. One or more of bits of the multi-bit configuration words are identified as “Don't Care” configuration bits that do not affect the functionality of the programmable logic device. These “Don't Care” configuration bits may or may not be related to the specific configuration of the programmable logic device. A lossy compression operation is performed on the multi-bit configuration words thereby creating a compressed data set. The identified “Don't Care” configuration bits are used during the compression operation. For example, the compression operation may include (1) maintaining a compression buffer of previously compressed configuration words, and (2) comparing configuration words to be compressed with the configuration words in the compression buffer, wherein the “Don't Care” configuration bits are deemed to result in matches during the comparison.
    • 一种用于处理用于配置可编程逻辑器件的多个多位配置字的方法和系统。 多位配置字中的一个或多个位被标识为不影响可编程逻辑器件的功能的“不关心”配置位。 这些“不关心”配置位可能或可能与可编程逻辑器件的具体配置无关。 对多位配置字执行有损压缩操作,从而创建压缩数据集。 在压缩操作期间使用标识的“不关心”配置位。 例如,压缩操作可以包括(1)维持先前压缩的配置字的压缩缓冲器,以及(2)将要压缩的配置字与压缩缓冲器中的配置字进行比较,其中“不关心”配置位 在比较期间被视为导致比赛。
    • 30. 发明授权
    • Method and apparatus for protecting proprietary decryption keys for programmable logic devices
    • 用于保护可编程逻辑器件的专用解密密钥的方法和装置
    • US06996713B1
    • 2006-02-07
    • US10112838
    • 2002-03-29
    • Stephen M. Trimberger
    • Stephen M. Trimberger
    • G06F1/26
    • G06F21/76
    • Described are methods and circuits of programming a programmable logic device with encrypted configuration data using one or more secure decryption keys. Configurable resources within PLDS in accordance with one embodiment are divided into first and second collections of configurable interconnect resources separated by a collection of switches. One collection of resources has access to one or more decryption keys required to decrypt the encrypted configuration data. The switches protect the proprietary keys by providing a secure boundary around the portion granted key access during the decryption process. Closing the switches after configuration clears user memory to prevent users from accessing stored versions of the proprietary keys.
    • 描述了使用一个或多个安全解密密钥对具有加密配置数据的可编程逻辑设备进行编程的方法和电路。 根据一个实施例的PLDS内的可配置资源被划分为由开关集合分隔开的可配置互连资源的第一和第二集合。 一组资源可以访问解密加密的配置数据所需的一个或多个解密密钥。 交换机通过在解密过程中为授予密钥访问的部分提供安全边界来保护专有密钥。 配置后关闭交换机会清除用户内存,以防止用户访问专有密钥的存储版本。