Shopping Cart

No products in the cart.

IEEE 1735 2014:2015 Edition

$52.00

IEEE Recommended Practice for Encryption and Management of Electronic Design Intellectual Property (IP)

Published By Publication Date Number of Pages
IEEE 2015 90
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Active. Guidance on technical protection measures to those who produce, use, process, or standardize the specifications of electronic design intellectual property (IP) are provided in this recommended practice. Distribution of IP creates a risk of unsanctioned use and dilution of the investment in its creation. The measures presented here include protection through encryption, specification, and management of use rights that have been granted by the producers of electronic designs, and methods for integrating license verification for granted rights. (The PDF of this standard is available at no cost compliments of the Accellera Systems Initiative at https://ieeexplore.ieee.org/browse/standards/get-program/page)

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 1735-2014 Front cover
3 Title page
5 Important Notices and Disclaimers Concerning IEEE Standards Documents
8 Participants
10 Introduction
11 Contents
13 IMPORTANT NOTICE
1. Overview
1.1 Scope
14 1.2 Purpose, value, and approach
1.3 Key characteristics of this standard
15 1.4 Conventions used in this standard
1.5 Use of color in this standard
16 1.6 Contents of this standard
17 2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions
19 3.2 Acronyms and abbreviations
20 4. Trust model
4.1 Stakeholders
4.2 Role of IP protection
21 4.3 Protection via encryption
22 4.4 Components of trust
24 5. Interoperability
5.1 Background
5.2 version pragma
25 5.3 Basic interoperability
28 5.4 Use cases
31 5.5 Secure keyring
33 6. Key management
6.1 Overview
6.2 Key considerations
34 6.3 Basic key exchange
35 6.4 Standard key exchange
37 6.5 Key scope recommendations
39 7. Rights management [V2]
7.1 Introduction
7.2 Rights scope
7.3 Tool types and rights
40 7.4 Syntax and markup
46 7.5 Tamper-proof requirements
7.6 Complete tool block and rights example
48 8. License management [V2]
8.1 Introduction
8.2 License system
8.3 License proxy
8.4 License specification
49 8.5 License proxy parameters
50 8.6 License use
51 8.7 Multiple envelopes
52 8.8 Proxy communication
8.9 License proxy transactions
56 8.10 License proxy commands
57 8.11 Deprecated licensing pragmas
58 9. Visibility management
9.1 Introduction
9.2 Background [V1]
59 9.3 Visibility in tool phases [V1]
62 9.4 Visibility and encryption envelopes [V1]
64 9.5 viewport pragmas
70 9.6 Programming language interfaces
72 9.7 Controlling visibility with rights [V2]
73 9.8 Visibility of dynamic objects [V2]
9.9 Unresolved visibility issues
74 10. Common rights [V2]
10.1 Defining common rights
10.2 Overriding common rights
10.3 Defaults and the delegated value
75 10.4 Common conditions for rights
76 10.5 Common right for error handling
77 10.6 Common right for visibility
78 10.7 Common right for child visibility
79 10.8 Common right for decryption
80 Annex A (informative) Bibliography
81 Annex B (informative) Other known issues with IP protection
87 Annex C (normative) Protection pragmas
90 Back cover
IEEE 1735 2014
$52.00