INTEGRATED CIRCUIT, METHOD FOR PROTECTING AN INTEGRATED CIRCUIT AND COMPUTER PROGRAM PRODUCT
First Claim
1. An integrated circuit comprising an active shield in a first layer and at least one security-critical component in a second layer, said security-critical component being configured to generate an access key for enabling access to at least a part of said security-critical component, wherein said access key is based on an output value of the active shield.
1 Assignment
0 Petitions
Accused Products
Abstract
According to a first aspect of the present disclosure, an integrated circuit is provided which comprises an active shield in a first layer and at least one security-critical component in a second layer, said security-critical component being configured to generate an access key for enabling access to at least a part of said security-critical component, wherein said access key is based on an output value of the active shield. According to a second aspect of the present disclosure, a corresponding method for protecting an integrated circuit is conceived. According to a third aspect of the present disclosure, a corresponding computer program product is provided.
-
Citations
15 Claims
- 1. An integrated circuit comprising an active shield in a first layer and at least one security-critical component in a second layer, said security-critical component being configured to generate an access key for enabling access to at least a part of said security-critical component, wherein said access key is based on an output value of the active shield.
- 14. A method for protecting an integrated circuit, said integrated circuit comprising an active shield in a first layer and at least one security-critical component in a second layer, wherein the security-critical component generates an access key for enabling access to at least a part of said security-critical component, and wherein said access key is based on an output value of the active shield.
Specification