Secure processor operation using integrated circuit configuration circuitry
First Claim
Patent Images
1. A method, comprising:
- loading encrypted program code encapsulated within a bitstream into an integrated circuit (IC) through a configuration port of the IC;
decrypting the encrypted program code using a decryptor of the IC resulting in decrypted program code;
wherein the decryptor and the configuration port are implemented as non-programmable hard circuitry within the IC and the decrypted program code is executable by a processor; and
providing the decrypted program code to the processor by outputting the decrypted program code from the IC through the configuration port of the IC.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of processor operation using an integrated circuit (IC) can include loading encrypted program code into the IC through a configuration port of the IC and decrypting the encrypted program code using configuration circuitry of the IC. Decryption of the encrypted program code can result in decrypted program code which can be provided to a target destination.
22 Citations
15 Claims
-
1. A method, comprising:
-
loading encrypted program code encapsulated within a bitstream into an integrated circuit (IC) through a configuration port of the IC; decrypting the encrypted program code using a decryptor of the IC resulting in decrypted program code; wherein the decryptor and the configuration port are implemented as non-programmable hard circuitry within the IC and the decrypted program code is executable by a processor; and providing the decrypted program code to the processor by outputting the decrypted program code from the IC through the configuration port of the IC. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
an integrated circuit (IC) comprising; a configuration port configured to receive a bitstream comprising encapsulated, encrypted program code; a configuration module coupled to the configuration port and configured to distinguish between configuration data for the IC and the encrypted program code within the bitstream; and a decryptor coupled to the configuration module, wherein the decryptor is configured to decrypt configuration data for the IC that is encrypted and the encrypted program code, and generate decrypted program code; wherein the configuration module and the decryptor are implemented as non-programmable hard circuitry within the IC and the configuration port is further configured to output the decrypted program code from the IC; and a processor coupled to the IC, wherein the processor is configured to receive the decrypted program code; wherein the decrypted program code is executable by the processor. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method, comprising:
-
loading encrypted program code encapsulated within a bitstream into an integrated circuit (IC) through a configuration port of the IC; decrypting the encrypted program code using a decryptor of the IC resulting in decrypted program code; wherein the decryptor and the configuration port are implemented as non-programmable hard circuitry within the IC and the decrypted program code is executable by a processor; and providing the decrypted program code to the processor by loading configuration data specifying circuitry for implementation within programmable circuitry of the IC, wherein the circuitry specifies a data port that, when instantiated within the IC, forms a path through which the decrypted program code is provided to the processor. - View Dependent Claims (13, 14, 15)
-
Specification