Method and apparatus for a configurable protection architecture for on-chip systems
First Claim
Patent Images
1. An apparatus, comprising:
- a target intellectual property block configured to field and service requests from an initiator intellectual property block in a system-on-chip network;
said system-on-chip network having an associated protection mechanism with logic configured to restrict access for the requests to the target intellectual property block based on access permissions associated with a protection region within the target intellectual property block and attributes of a first request trying to access that region, wherein a destination address and a source protection ID are extracted out of the first request and then
1) the address is decoded and compared against an address map to find out where the target intellectual property block is and
2) the source protection ID from the first request is checked against a protection key map to determine whether the first request should be delivered to the target intellectual property block.
3 Assignments
0 Petitions
Accused Products
Abstract
Various methods and apparatuses of protection mechanism are described. A target intellectual property block may field and service requests from an initiator intellectual property block in a system-on-chip network. The target intellectual property block has an associated protection mechanism with logic configured to restrict access for the requests to the target intellectual property block. The request'"'"'s access is restricted based on access permissions associated with a region within the target intellectual property block and attributes of the request trying to access that region.
60 Citations
26 Claims
-
1. An apparatus, comprising:
-
a target intellectual property block configured to field and service requests from an initiator intellectual property block in a system-on-chip network; said system-on-chip network having an associated protection mechanism with logic configured to restrict access for the requests to the target intellectual property block based on access permissions associated with a protection region within the target intellectual property block and attributes of a first request trying to access that region, wherein a destination address and a source protection ID are extracted out of the first request and then
1) the address is decoded and compared against an address map to find out where the target intellectual property block is and
2) the source protection ID from the first request is checked against a protection key map to determine whether the first request should be delivered to the target intellectual property block. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification