IEEE 1735 2014:2015 Edition
$52.00
IEEE Recommended Practice for Encryption and Management of Electronic Design Intellectual Property (IP)
Published By | Publication Date | Number of Pages |
IEEE | 2015 | 90 |
New IEEE Standard – Active. Guidance on technical protection measures to those who produce, use, process, or standardize the specifications of electronic design intellectual property (IP) are provided in this recommended practice. Distribution of IP creates a risk of unsanctioned use and dilution of the investment in its creation. The measures presented here include protection through encryption, specification, and management of use rights that have been granted by the producers of electronic designs, and methods for integrating license verification for granted rights. (The PDF of this standard is available at no cost compliments of the Accellera Systems Initiative at https://ieeexplore.ieee.org/browse/standards/get-program/page)
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 1735-2014 Front cover |
3 | Title page |
5 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
10 | Introduction |
11 | Contents |
13 | IMPORTANT NOTICE 1. Overview 1.1 Scope |
14 | 1.2 Purpose, value, and approach 1.3 Key characteristics of this standard |
15 | 1.4 Conventions used in this standard 1.5 Use of color in this standard |
16 | 1.6 Contents of this standard |
17 | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions |
19 | 3.2 Acronyms and abbreviations |
20 | 4. Trust model 4.1 Stakeholders 4.2 Role of IP protection |
21 | 4.3 Protection via encryption |
22 | 4.4 Components of trust |
24 | 5. Interoperability 5.1 Background 5.2 version pragma |
25 | 5.3 Basic interoperability |
28 | 5.4 Use cases |
31 | 5.5 Secure keyring |
33 | 6. Key management 6.1 Overview 6.2 Key considerations |
34 | 6.3 Basic key exchange |
35 | 6.4 Standard key exchange |
37 | 6.5 Key scope recommendations |
39 | 7. Rights management [V2] 7.1 Introduction 7.2 Rights scope 7.3 Tool types and rights |
40 | 7.4 Syntax and markup |
46 | 7.5 Tamper-proof requirements 7.6 Complete tool block and rights example |
48 | 8. License management [V2] 8.1 Introduction 8.2 License system 8.3 License proxy 8.4 License specification |
49 | 8.5 License proxy parameters |
50 | 8.6 License use |
51 | 8.7 Multiple envelopes |
52 | 8.8 Proxy communication 8.9 License proxy transactions |
56 | 8.10 License proxy commands |
57 | 8.11 Deprecated licensing pragmas |
58 | 9. Visibility management 9.1 Introduction 9.2 Background [V1] |
59 | 9.3 Visibility in tool phases [V1] |
62 | 9.4 Visibility and encryption envelopes [V1] |
64 | 9.5 viewport pragmas |
70 | 9.6 Programming language interfaces |
72 | 9.7 Controlling visibility with rights [V2] |
73 | 9.8 Visibility of dynamic objects [V2] 9.9 Unresolved visibility issues |
74 | 10. Common rights [V2] 10.1 Defining common rights 10.2 Overriding common rights 10.3 Defaults and the delegated value |
75 | 10.4 Common conditions for rights |
76 | 10.5 Common right for error handling |
77 | 10.6 Common right for visibility |
78 | 10.7 Common right for child visibility |
79 | 10.8 Common right for decryption |
80 | Annex A (informative) Bibliography |
81 | Annex B (informative) Other known issues with IP protection |
87 | Annex C (normative) Protection pragmas |
90 | Back cover |