Computer engineers at the University of Michigan and Rice University have designed a comprehensive approach to counter this costly infringement. Each microprocessor has its own "lock" and key. Who owns the patent will be whoever has the keys. The microprocessor can communicate with the appropriate security to the owner of the patent, to put into operation, and may operate only after you remove the lock.
engineers call their technical EPIC, short for Ending Piracy of Integrated Circuits (to end piracy circuit integrated). The technique relies on established cryptography methods and introduces subtle changes in the microprocessor design process. But this does not affect the performance or power consumption of the microprocessor.
Jarrod Roy, a computer engineer from Michigan, presented a paper on EPIC at the Conference on Design Automation and Test in Europe (Design Automation and Test in Europe, DATE) in Germany on 13 March.
piracy of integrated circuits has increased in recent years since U.S. companies began to contract with external suppliers of production characteristics of new microprocessors advanced. The transfer of microprocessor designs to overseas sites opened new doors for the profiteers who have used the chips to manufacture MP3 devices, cell phones, computers and other equipment counterfeit.
"pirated microprocessors are sometimes sold for pennies, but they are exactly the same as normal chips," Markov said. "They were designed in the U.S. and usually manufactured overseas, where intellectual property laws are more lax. Someone copy schemes or microprocessors manufactured without authorization."
The construction and installation of a factory with all Advanced technology costs between 3,000 and 4,000 million U.S. dollars, said Farinaz Koushanfar, Professor of Electrical and Computer Engineering at Rice, co-author of the article.
"Therefore, a growing number of semiconductor companies including Texas Instruments and Freescale (formerly a division of Motorola) recently announced it would cease manufacturing chips with finer features, and contracted production in Asia East. However, even within the United States, it has sometimes happened that some employees say the integrated circuits that operate free of defects, then these are sold in markets turbid. "
With EPIC protection built in, each integrated circuit is manufactured with a few extra switches that work like a combination lock. Each will also have the ability to produce their own identification number, random, 64-bit not be changed. semiconductors are not manufactured with an ID number, but rather with the tools necessary to produce the number during activation.
EPIC In the context of semiconductors will not work properly until activated. For activation of a microprocessor, the manufacturer must install it and leave the semiconductor contact the owner of the patent through a regular phone line or Internet connection.
"All chips are produced from the same design scheme, but differ when put into operation the first time and generate their ID," Roy said. "Before activation, nothing is known about the numbers."
The microprocessor will transmit its ID number securely to the patent holder. It records the number, find the combination to the padlock off the microprocessor in particular, and also safely respond with the key that activates it.
The peculiarity of the activation key eliminates the possibility that someone can observe it and reuse it without breaking. Since the key is generated in the process would not make sense to copy it as one would copy the keys to activate a computer program, which are printed on the envelopes of compact discs.
In theory there are ways to illegally copy chips protected by EPIC, Markov said. But EPIC makes this very difficult.
"If someone is determined, really, to try and had paid a hundred million dollars to spend on the effort, could make the reverse engineering of the entire microprocessor separating all its parts. But the point of piracy is to avoid such costs," said. "The goal of a practical system like ours is not to do something impossible, but to ensure that buying a license and legal production of the semiconductor is cheaper than forgery."
engineers call their technical EPIC, short for Ending Piracy of Integrated Circuits (to end piracy circuit integrated). The technique relies on established cryptography methods and introduces subtle changes in the microprocessor design process. But this does not affect the performance or power consumption of the microprocessor.
Jarrod Roy, a computer engineer from Michigan, presented a paper on EPIC at the Conference on Design Automation and Test in Europe (Design Automation and Test in Europe, DATE) in Germany on 13 March.
piracy of integrated circuits has increased in recent years since U.S. companies began to contract with external suppliers of production characteristics of new microprocessors advanced. The transfer of microprocessor designs to overseas sites opened new doors for the profiteers who have used the chips to manufacture MP3 devices, cell phones, computers and other equipment counterfeit.
"pirated microprocessors are sometimes sold for pennies, but they are exactly the same as normal chips," Markov said. "They were designed in the U.S. and usually manufactured overseas, where intellectual property laws are more lax. Someone copy schemes or microprocessors manufactured without authorization."
The construction and installation of a factory with all Advanced technology costs between 3,000 and 4,000 million U.S. dollars, said Farinaz Koushanfar, Professor of Electrical and Computer Engineering at Rice, co-author of the article.
"Therefore, a growing number of semiconductor companies including Texas Instruments and Freescale (formerly a division of Motorola) recently announced it would cease manufacturing chips with finer features, and contracted production in Asia East. However, even within the United States, it has sometimes happened that some employees say the integrated circuits that operate free of defects, then these are sold in markets turbid. "
With EPIC protection built in, each integrated circuit is manufactured with a few extra switches that work like a combination lock. Each will also have the ability to produce their own identification number, random, 64-bit not be changed. semiconductors are not manufactured with an ID number, but rather with the tools necessary to produce the number during activation.
EPIC In the context of semiconductors will not work properly until activated. For activation of a microprocessor, the manufacturer must install it and leave the semiconductor contact the owner of the patent through a regular phone line or Internet connection.
"All chips are produced from the same design scheme, but differ when put into operation the first time and generate their ID," Roy said. "Before activation, nothing is known about the numbers."
The microprocessor will transmit its ID number securely to the patent holder. It records the number, find the combination to the padlock off the microprocessor in particular, and also safely respond with the key that activates it.
The peculiarity of the activation key eliminates the possibility that someone can observe it and reuse it without breaking. Since the key is generated in the process would not make sense to copy it as one would copy the keys to activate a computer program, which are printed on the envelopes of compact discs.
In theory there are ways to illegally copy chips protected by EPIC, Markov said. But EPIC makes this very difficult.
"If someone is determined, really, to try and had paid a hundred million dollars to spend on the effort, could make the reverse engineering of the entire microprocessor separating all its parts. But the point of piracy is to avoid such costs," said. "The goal of a practical system like ours is not to do something impossible, but to ensure that buying a license and legal production of the semiconductor is cheaper than forgery."
0 comments:
Post a Comment