Method and circuit for secure definition and integration of cores
First Claim
1. A method for the secured use of a core using a block diagram based design tool, the method comprising:
- obtaining, by a processor, a core development package including;
an encrypted core; and
a decryption key for the encrypted core, the decryption key encrypted with an asymmetric cipher;
transmitting the core development package from the design tool to a trusted platform module;
decrypting the decryption key with a private key of the asymmetric cipher by the trusted platform module;
decrypting the encrypted core by the trusted platform module using the decryption key; and
performing one or more design tool operations using the decrypted core.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the present invention provides a method and circuit for secure definition and integration of a core into a circuit design without exposing the core. In one embodiment, a core development package is obtained. The core development package includes an encrypted core and a decryption key of the encrypted core. The decryption key is encrypted with an asymmetric cipher. The encrypted core is transmitted from the design tool to a trusted platform module. The decryption key is decrypted with a private key of the asymmetric cipher. The encrypted core is decrypted within the trusted platform module. One or more design tool operations are performed using the decrypted core.
-
Citations
20 Claims
-
1. A method for the secured use of a core using a block diagram based design tool, the method comprising:
-
obtaining, by a processor, a core development package including; an encrypted core; and a decryption key for the encrypted core, the decryption key encrypted with an asymmetric cipher; transmitting the core development package from the design tool to a trusted platform module; decrypting the decryption key with a private key of the asymmetric cipher by the trusted platform module; decrypting the encrypted core by the trusted platform module using the decryption key; and performing one or more design tool operations using the decrypted core. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for core distribution, comprising:
-
a first processor, a second processor, and a storage unit coupled to a common bus; wherein; an asymmetric private key is stored in the storage unit; the first processor is configured to receive a secure core development package including an encrypted core and a decryption key for the encrypted core, the decryption key encrypted with an asymmetric public key corresponding to the private key; and the second processor is configured to; decrypt the decryption key with the private key; and decrypt the encrypted core with the decrypted decryption key; wherein the first processor is configured to perform one or more design tool functions using the decrypted core, in response to a signal received from a design tool, and produce an output.
-
-
19. A method for secure distribution of a core, comprising:
-
receiving, by a processor, a request for a core, the request including; a core indicator; and a trusted platform module serial number; encrypting a core corresponding to the core indicator with a symmetric cipher; retrieving an asymmetric public key of an asymmetric cipher and corresponding to the serial number; and encrypting a decryption key corresponding to the symmetric cipher with the asymmetric public key; wherein the trusted platform module serial number corresponds to a trusted platform module that is configured to; receive the encrypted core and encrypted decryption key; decrypt the decryption key with a private key of the asymmetric cipher by the trusted platform module; decrypt the encrypted core by the trusted platform module; and perform one or more design tool operations using the decrypted core. - View Dependent Claims (20)
-
Specification