Intellectual property metering(14)

时间:2026-01-22

Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts and copied programs. The key idea is to make each design slightly different d

8 Conclusion

We have developed the first hardware and software (intellectual property) usage metering scheme. The scheme enables design companies to securely control licensing rights for their IP. The utilizes a small percentage of a design implemented using configurable tech-nology to embed a unique ID to each manufactured design instance. This scheme is gener-alized in a number of ways and applied to both hardware and software metering.

We also presented mathematical analysis for detection accuracy of the proposed scheme. We demonstrated the ability of the scheme to implement very high number of chips with different ID. The main result of the paper is that we established generic connec-tion between the scheme and synthesis and compilation tasks.

References [1] R. Anderson, M. Kuhn, “Tamper resistance-a cautionary note.”USENIX Workshop on Elec-tronic Commerce, pp. 1-11, 1996.[2] T. Aura, D. Gollmann, D. “Software license management with smart cards. Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’99), pp.75-85, May1999.[3] B.S. Baker and U. Manber. “Deducing similarities in Java sources from bytecodes,” USENIX Technical Conference, pp.179-90, 1998.[4] S. Brin, J. Davis, and H. Garcia-Molina. “Copy detection mechanisms for digital documents,”SIGMOD Record, vol. 24, No. 2, pp. 398-409, 1995.[5] A.E. Caldwell, H. Choi, A.B. Kahng, S. Mantik, M. Potkonjak, G. Qu, and J.L. Wong. “Effective iterative techniques for fingerprinting design IP,” Design Automation Conference, pp. 843-848,1999.[6] G.J. Chaitin. “Register allocation and spilling via graph coloring.” SIGPLAN ‘82 Symposium on Compiler Construction, pp. 98-105, 1982. Design Automation Conference Proceedings, pp.843-848, June 1999.[7] E. Charbon and I. Torunoglu. “Copyright protection of designs based on multi source IPs,”IEEE/ACM International Conference on Computer Aided Design, pp. 591-595, June 1998.[8] C.S. Collberg, “Reverse interpretation + mutation analysis = automatic retargeting.” Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementa-tion, pp. 15-18, June 1997[9] R.E.Crochiere, A.V. Oppenheim. “Analysis of linear digital networks.” Proceedings of the IEEE,vol.63, (no.4):581-95., April 1975[10] S. Dey, V. Gangaram, M. Potkonjak, “A controller redesign technique to enhance testability of controller-data path circuits.” IEEE Transactions on Computer-Aided Design of Integrated Cir-cuits and Systems, vol.17, (no.2):157-68. Feb 1998.[11] W. Diffie,M. Hellman, “New directions in cryptography.” IEEE Transactions on Information Theory, vol.IT-22, (no.6) p.644-54, Nov 1976. [12] http://www.dimacs.rutgers.edu [13] R. Findley Jr., Raymond, R. Dixon, “Dual smart card access control electronic data storage and retrieval system and methods” US patent#5629508, May 13, 1997. [14] P. Flajolet, D. Gardy, and L. Thimonier. “Birthday paradox, coupon collectors, caching algo-rithms and self-organizing search.” Discrete Applied Mathematics, Vol. 39, No. 3, 11 pp. 207-229, November 1992.Table 3: Generated number of distinct solutions for the SAT-based metering scheme File

Variables #of solutions ii8a1

66 1.3E08ii8a2

180 5.8E17ii8a3

264 3.2E32ii8a4

396 4.3E37ii8b1

336 5.0E27ii8b2

576 2.3E46ii8b3

816 5.7E73ii8b41068 5.1E89

…… 此处隐藏:1536字,全部文档内容请下载后查看。喜欢就下载吧 ……
Intellectual property metering(14).doc 将本文的Word文档下载到电脑

精彩图片

热门精选

大家正在看

× 游客快捷下载通道(下载后可以自由复制和排版)

限时特价:4.9 元/份 原价:20元

支付方式:

开通VIP包月会员 特价:19元/月

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219