Continue to Site

Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

IP business, How to protect FPGA configuration PROM.

Status
Not open for further replies.

k621219

Newbie level 6
Joined
Apr 2, 2009
Messages
12
Helped
0
Reputation
0
Reaction score
0
Trophy points
1,281
Activity points
1,367
I am developing IP core.
Generally, IP core price is too expensive to small company.
So I would like to sell the FPGA configuration PROM with bitstream of my IP core.
But PROM copy protection is a problem.

I want to know how to protect IP core and PROM copy.
If it is possible, I could sell the PROM with adding some royalty.

I think that this business model is good for IP core provider and IP user.
 


    k621219

    Points: 2
    Helpful Answer Positive Rating
Hi kvingle,

You are right. User can't integrate his own into bitstream.
This is another business.
Exactly not IP business, I would like to sell the IC instead of IP core because IP core price is too high to small company.
Anyway, It is a little problem that user can't integrate their own logic.

Thank for your good information.
 

Fundamentally, if an off-the-shelf FPGA is going to be able to read data out of anything resembling a standard PROM, then it has to be possible for the data in the PROM to be read, and for another device to mimic its behavior (most typically, by simply putting the data into another PROM).

I assume your objective is to require someone who builds N boards using your FPGA design to buy N physical objects from you. If the FPGA is an off-the-shelf unit which is controlled via external chip, it doesn't matter if the FPGA itself is bought from you, provided that something necessary to its operation is.

Even if you can't directly protect the configuration from copying, one thing you might be able to do would be to distribute a small code-protected microcontroller or CPLD along with a PROM (the microcontroller, depending upon its size, might be able to take the place of the PROM as well) and incorporate some hard-to-copy functionality in that latter chip without which the FPGA would be worthless. The simplest means of doing that would be to have the CPLD generate a sequential function of a two or more input signals, and have the FPGA generate the same function. Have the FPGA vary those signals in some random-ish fashion and stop working if the CPLD's signals aren't as expected.

If your device isn't too popular, this approach may be sufficient. Indeed, even a lowly 18CV8 or 22V10 might suffice to construct a hard-to-reverse-engineer "dongle". If someone took the time to examine your configuration, though, they could probably identify the "lockout" portion and disable it. If your device is obscure, odds are nobody would bother; if it's popular, though, someone might publish their reverse-engineering analysis on the web.
 

Status
Not open for further replies.

Similar threads

Part and Inventory Search

Welcome to EDABoard.com

Sponsor

Back
Top