Integrated circuit security and method therefor
First Claim
Patent Images
1. An integrated circuit (IC) comprising:
- protected functional circuitry;
storage circuitry for storing a stored IC security key;
an IC debug interface;
comparison circuitry, said comparison circuitry having a first input coupled to the storage circuitry, a second input coupled to the IC debug interface, and an output for providing a protection enable signal; and
access protection circuitry coupled to the protected functional circuitry and having an input to receive the protection enable signal.
25 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to an integrated circuit (IC), and more particularly to security to protect an IC (10) against unauthorized accesses. In one embodiment, an identifier is provided external to IC 10. A corresponding input IC security key (52) is then provided to IC 10 and compared to a stored IC security key (30). If the input IC security key (52) and the stored IC security key (30) do not match, access to protected functional circuitry (12) is prohibited. The present invention may use any debug interface, including standard debug interfaces using the JTAG 1149.1 interface defined by the IEEE.
-
Citations
34 Claims
-
1. An integrated circuit (IC) comprising:
-
protected functional circuitry;
storage circuitry for storing a stored IC security key;
an IC debug interface;
comparison circuitry, said comparison circuitry having a first input coupled to the storage circuitry, a second input coupled to the IC debug interface, and an output for providing a protection enable signal; and
access protection circuitry coupled to the protected functional circuitry and having an input to receive the protection enable signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for providing security in an IC having protected functional circuitry and at least one IC terminal coupled to the protected functional circuitry, said method comprising:
-
receiving an input IC security key via the at least one IC terminal;
comparing the input IC security key to a stored IC security key; and
selectively enabling access to the protected functional circuitry via the at least one IC terminal. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for providing security in an IC having protected functional circuitry and a JTAG interface, said method comprising:
-
in a first JTAG state, receiving a user defined instruction via the JTAG interface;
in a second JTAG state, receiving an input IC security key via the JTAG input interface, and comparing the input IC security key to a stored IC security key; and
selectively enabling access to the protected functional circuitry via the JTAG interface. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A method for providing security in an IC having protected functional circuitry and at least one IC terminal coupled to the protected functional circuitry, said method comprising:
-
accessing the protected functional circuitry via the at least one IC terminal;
programming a force enable indicator to enable comparison circuitry, wherein the comparison circuitry compares an input IC security key to a stored IC security key and, in response to comparing, selectively enables access to the protected functional circuitry via the at least one IC terminal. - View Dependent Claims (33, 34)
-
Specification