MY182400A - A method for protecting a programmable gate array design - Google Patents
A method for protecting a programmable gate array designInfo
- Publication number
- MY182400A MY182400A MYPI2013700744A MYPI2013700744A MY182400A MY 182400 A MY182400 A MY 182400A MY PI2013700744 A MYPI2013700744 A MY PI2013700744A MY PI2013700744 A MYPI2013700744 A MY PI2013700744A MY 182400 A MY182400 A MY 182400A
- Authority
- MY
- Malaysia
- Prior art keywords
- programmable gate
- gate array
- array design
- protecting
- uids
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/76—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a method for protecting a programmable gate array design. The method uses secure keys, unique identifications (UIDs), encrypted bit stream, as well as license server and software IDs for better protection of a programmable gate array design.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013700744A MY182400A (en) | 2013-05-08 | 2013-05-08 | A method for protecting a programmable gate array design |
PCT/MY2014/000081 WO2014182154A1 (en) | 2013-05-08 | 2014-04-28 | A method for protecting a programmable gate array design |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013700744A MY182400A (en) | 2013-05-08 | 2013-05-08 | A method for protecting a programmable gate array design |
Publications (1)
Publication Number | Publication Date |
---|---|
MY182400A true MY182400A (en) | 2021-01-25 |
Family
ID=51261194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2013700744A MY182400A (en) | 2013-05-08 | 2013-05-08 | A method for protecting a programmable gate array design |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY182400A (en) |
WO (1) | WO2014182154A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848153A (en) * | 2018-06-08 | 2018-11-20 | 山东超越数控电子股份有限公司 | A kind of high-availability cluster software License registration, Activiation method and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0114317D0 (en) * | 2001-06-13 | 2001-08-01 | Kean Thomas A | Method of protecting intellectual property cores on field programmable gate array |
US8417965B1 (en) * | 2010-04-07 | 2013-04-09 | Xilinx, Inc. | Method and circuit for secure definition and integration of cores |
-
2013
- 2013-05-08 MY MYPI2013700744A patent/MY182400A/en unknown
-
2014
- 2014-04-28 WO PCT/MY2014/000081 patent/WO2014182154A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2014182154A1 (en) | 2014-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
PH12018501159A1 (en) | Composition and methods for immunooncology | |
IL249962B (en) | Malicious code protection for computer systems based on process modification | |
IL244948B (en) | System and method for encryption key management, federation and distribution | |
PH12016500463A1 (en) | Key and disc tumbler cylinder lock | |
EP3197123A4 (en) | Method, terminal, and network server for information encryption and decryption and key management | |
EP3232602A4 (en) | Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program | |
EP3314809A4 (en) | Distributing an authentication key to an application installation | |
GB201507154D0 (en) | Encoder, decoder, encryption system, encryption key wallet and method | |
EP2947810A4 (en) | Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program | |
EP2905715A4 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
EP3029877A4 (en) | Authenticated encryption device, authenticated encryption method, and program for authenticated encryption | |
EP3379768A4 (en) | Encryption device, encrypted text conversion device, encryption program, encrypted text conversion program, encryption method, and encrypted text conversion method | |
MX2014013295A (en) | Systems and methods for secure processing with embedded cryptographic unit. | |
EP3343830A4 (en) | Encryption system, homomorphic signature method, and homomorphic signature program | |
EP3334085A4 (en) | Management device, management system, key generation device, key generation system, key management system, vehicle, management method, key generation method, and computer program | |
EP3371928B8 (en) | Key sequence generation for cryptographic operations | |
EP2998948A4 (en) | Encryption system, encryption method, and encryption program | |
EP3059898A4 (en) | Key device, key cloud system, decryption method, and program | |
EP3096488A4 (en) | Hypersphere-based multivariable public key encryption/decryption system and method | |
EP3274908A4 (en) | Technologies for hardening data encryption with secure enclaves | |
EP3213185A4 (en) | Computer security system and method to protect against keystroke logging | |
EP2782087A4 (en) | Encryption processing system, encryption processing method, encryption processing program and key generator | |
EP3304405A4 (en) | Encryption directed database management system and method | |
EP2954646A4 (en) | Method for enabling lawful interception by providing security information. | |
EP3057262A4 (en) | Cipher system, encryption device, re-encryption key generation device, re-encryption device, and cipher program |