Method and apparatus for enhancing security in and discouraging theft of VLSI and ULSI devices
First Claim
1. A large scale integrated device having a core functional circuit and at least one output port, said device comprising:
- a security mechanism;
a controller to control the operation of the security mechanism;
a boundary scan port electrically coupled to said controller, said boundary scan port providing an interface between the security mechanism and an external medium;
a flash memory electrically coupled to said controller, said flash memory providing the security mechanism with non-volatile storage of predetermined information and data;
a set of security registers for providing functional support to said controller, said security registers electrically coupled to said flash memory, said controller and said boundary scan port; and
tristate control logic for providing said controller with functional control over the core functional circuit and the output ports of the large scale integrated device, said tristate logic control electrically coupled to said controller, the core functional circuit and output ports of the device.
6 Assignments
0 Petitions
Accused Products
Abstract
VLSI and ULSI devices like microprocessors and DRAM devices are prone to large scale theft from factories and warehouses. A proposed method of reducing the theft incorporates a small amount of non-volatile flash memory in these devices. The flash memory contains password, device serial number and user identification information. On power-up, the device initiates an encrypted password verification session through a standard interface. If the user supplied password fails, the device'"'"'s operational ports (any data or control output buses) are tri-stated, thus making the device unusable. The device serial number and user identification information are useful in determining ownership of stolen devices when recovered.
-
Citations
25 Claims
-
1. A large scale integrated device having a core functional circuit and at least one output port, said device comprising:
-
a security mechanism; a controller to control the operation of the security mechanism; a boundary scan port electrically coupled to said controller, said boundary scan port providing an interface between the security mechanism and an external medium; a flash memory electrically coupled to said controller, said flash memory providing the security mechanism with non-volatile storage of predetermined information and data; a set of security registers for providing functional support to said controller, said security registers electrically coupled to said flash memory, said controller and said boundary scan port; and tristate control logic for providing said controller with functional control over the core functional circuit and the output ports of the large scale integrated device, said tristate logic control electrically coupled to said controller, the core functional circuit and output ports of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A built-in security mechanism for a large scale integrated device, the device having a core functional circuit and output ports, the security mechanism comprising:
-
a controller to control the operation of the security mechanism; a boundary scan port electrically coupled to said controller, said boundary scan port providing an interface between the security mechanism and an external medium; a flash memory electrically coupled to said controller, said flash memory providing the security mechanism with non-volatile storage of predetermined information and data; a set of security registers for providing functional support to said controller, said security registers electrically coupled to said flash memory, said controller and said boundary scan port; and tristate control logic for providing said controller with functional control over the core functional circuit and the output ports of the large scale integrated device, said tristate logic control electrically coupled to said controller and the core functional circuit and output ports of the device to prevent unauthorized use thereof. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of protecting large scale integrated devices from theft, the large scale integrated devices having a core functional circuit and output ports, the method comprising the steps of:
-
entering into a security session between a security mechanism and an external medium to protect unauthorized access to the core functional circuit and the output ports from said external medium; and controlling access to the core functional circuit and the output ports through tristate control logic by verifying a requested password from said external medium. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification