亞洲知識產權資訊網為知識產權業界提供一個一站式網上交易平台,協助業界發掘知識產權貿易商機,並與環球知識產權業界建立聯繫。無論你是知識產權擁有者正在出售您的知識產權,或是製造商需要購買技術以提高操作效能,又或是知識產權配套服務供應商,你將會從本網站發掘到有用的知識產權貿易資訊。

Virtual Architecture Overlay for Computer Hardware Security

標題
A Uniquified FPGA Virtualization Approach to Hardware Security
詳細技術說明
None
*Abstract

Increases Hardware Security and Information Processing Efficiency

This virtual architecture interface improves both security and performance for field-programmable gate arrays (FPGAs). FPGAs are integrated circuits that can be configured — and reconfigured — by a customer after manufacture. They function almost as blank slates, which the customer can customize with a bit file. This flexibility allows FGPA use in a wide variety of fields, including wearable electronics, space exploration, defense and the internet of things (IoT), which refers to the connection of devices like appliances, cars or health monitors to the internet. Available computer-aided design (CAD) tools for FPGAs fail to provide the security, performance, and programmability that these types of uses demand.

Researchers at the University of Florida have developed a full bridge LLC resonant converter that automatically dampens the amount of electromagnetic interference produced.

Application

These virtual architecture interfaces provide a range of overlay architectures to improve the performance, security, and programmability of FGPAs

Advantages

  • Improves data security, reducing risk of piracy or cloning
  • Constructs overlay architecture closely matched to the requirements of an application or domain, improving programmability, flexibility, and productivity
  • Reduces bitstream size, enabling easier field upgrades
  • Allows for dynamic reconfiguration of FPGAs, improving working flexibility
  • Increases design-space exploration speed by three orders of magnitude, allowing for faster innovation and development

Technology

Unique virtual architectures make the underlying hardware appear different on every FPGA device, despite having the same functionality, by separating true device functionality from hardware-specific resources. The architecture interface makes reverse engineering, piracy, and tampering difficult because while the actual FPGA architecture is described in documentation, and the hardware itself is identical among specific devices. The overlay architecture can be proprietary for a company or product and kept confidential. The automatically-generated architectural variants can deter large-scale piracy and reverse engineering efforts.
*IP Publication Date
Jun 14, 2018
*Principal Investigation

Name: Greg Stitt

Department:


Name: Kai Yang

Department:


Name: Robert Karam

Department:


Name: Swarup Bhunia

Department:

申請日期
Dec 12, 2017
其他
國家/地區
美國

欲了解更多信息,請點擊 這裡
移動設備