Protection against tamper using in-rush current
First Claim
Patent Images
1. A method for protecting an integrated circuit device against security violations, comprising:
- monitoring a characteristic of a component of the integrated circuit device for security violations;
identifying a security violation of the component of the integrated circuit device, wherein the act of identifying the security violation comprises identifying an attempted security breach of the integrated circuit device, wherein the act of identifying the security violation of the component of the integrated circuit device comprises determining whether the characteristic of the component being monitored has a variation that is outside a threshold, and wherein the act of identifying the security violation comprises identifying a voltage change, identifying a frequency characteristic change, or identifying a security key-code change; and
in response to the identified security violation, performing an act comprising (a) internally destroying the component of the integrated circuit device by providing current to the component beyond a tolerable limit of the component, (b) powering down the integrated circuit device, (c) restarting the component, or (d) taking no action.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for protecting an integrated circuit device against security violations includes monitoring a component of the integrated circuit device for security violations. A security violation of the component of the integrated circuit device is then identified. The component of the integrated circuit device is then internally destroyed in response to the identified security violation by providing current to the component beyond a tolerable limit of the component.
-
Citations
19 Claims
-
1. A method for protecting an integrated circuit device against security violations, comprising:
-
monitoring a characteristic of a component of the integrated circuit device for security violations; identifying a security violation of the component of the integrated circuit device, wherein the act of identifying the security violation comprises identifying an attempted security breach of the integrated circuit device, wherein the act of identifying the security violation of the component of the integrated circuit device comprises determining whether the characteristic of the component being monitored has a variation that is outside a threshold, and wherein the act of identifying the security violation comprises identifying a voltage change, identifying a frequency characteristic change, or identifying a security key-code change; and in response to the identified security violation, performing an act comprising (a) internally destroying the component of the integrated circuit device by providing current to the component beyond a tolerable limit of the component, (b) powering down the integrated circuit device, (c) restarting the component, or (d) taking no action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An integrated circuit device, comprising:
-
a processor system (PS) domain; a programmable logic (PL) domain; and a power management module configured to, in response to an identified security violation of the integrated circuit device, (a) internally destroy one or more components of the integrated circuit device by providing current to the one or more components beyond tolerable limits of the one or more components, (b) power down the integrated circuit device, (c) restart the one or more components, or (d) take no action, wherein the security violation comprises an attempted security breach of the integrated circuit device; wherein the identified security violation comprises an identified variation of a characteristic of the one or more components being monitored, the identified variation comprising voltage change, an identified frequency characteristic change, or an identified security key-code change. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification