亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。

Virtual Architecture Overlay for Computer Hardware Security

标题
A Uniquified FPGA Virtualization Approach to Hardware Security
详细技术说明
None
*Abstract

Increases Hardware Security and Information Processing Efficiency

This virtual architecture interface improves both security and performance for field-programmable gate arrays (FPGAs). FPGAs are integrated circuits that can be configured — and reconfigured — by a customer after manufacture. They function almost as blank slates, which the customer can customize with a bit file. This flexibility allows FGPA use in a wide variety of fields, including wearable electronics, space exploration, defense and the internet of things (IoT), which refers to the connection of devices like appliances, cars or health monitors to the internet. Available computer-aided design (CAD) tools for FPGAs fail to provide the security, performance, and programmability that these types of uses demand.

Researchers at the University of Florida have developed a full bridge LLC resonant converter that automatically dampens the amount of electromagnetic interference produced.

Application

These virtual architecture interfaces provide a range of overlay architectures to improve the performance, security, and programmability of FGPAs

Advantages

  • Improves data security, reducing risk of piracy or cloning
  • Constructs overlay architecture closely matched to the requirements of an application or domain, improving programmability, flexibility, and productivity
  • Reduces bitstream size, enabling easier field upgrades
  • Allows for dynamic reconfiguration of FPGAs, improving working flexibility
  • Increases design-space exploration speed by three orders of magnitude, allowing for faster innovation and development

Technology

Unique virtual architectures make the underlying hardware appear different on every FPGA device, despite having the same functionality, by separating true device functionality from hardware-specific resources. The architecture interface makes reverse engineering, piracy, and tampering difficult because while the actual FPGA architecture is described in documentation, and the hardware itself is identical among specific devices. The overlay architecture can be proprietary for a company or product and kept confidential. The automatically-generated architectural variants can deter large-scale piracy and reverse engineering efforts.
*IP Publication Date
Jun 14, 2018
*Principal Investigation

Name: Greg Stitt

Department:


Name: Kai Yang

Department:


Name: Robert Karam

Department:


Name: Swarup Bhunia

Department:

申请日期
Dec 12, 2017
其他
国家/地区
美国

欲了解更多信息,请点击 这里
移动设备