
SV51010
2014.01.10
Security Key Types
8-37
Provides more information about JTAG binary instruction code related to the LOCK and UNLOCK
instructions.
Security Key Types
Stratix V devices offer two types of keys — volatile and non-volatile. The following table lists the differences
between the volatile key and non-volatile keys.
Table 8-9: Security Key Types
Key Types
Key Programmability
Power Supply for Key
Programming Method
Storage
Volatile
? Reprogrammable Required external
battery, V CCBAT (16)
? Erasable
On-board
Non-volatile
One-time
programming
Does not require an
external battery
On-board and in-socket
programming (17)
Both non-volatile and volatile key programming offers protection from reverse engineering and copying. If
you set the tamper-protection bit, the design is also protected from tampering.
You can perform key programming through the JTAG pins interface. Ensure that the nSTATUS pin is released
high before any key-programming attempts.
Note: To clear the volatile key, issue the KEY_CLR_VREG JTAG instruction. To verify the volatile key has
been cleared, issue the KEY_VERIFY JTAG instruction.
Related Information
? Supported JTAG Instruction on page 10-3
Provides more information about the KEY_CLR_VREG and KEY_VERIFY instructions.
Provides more information about the KEY_CLR_VREG and KEY_VERIFY JTAG instructions.
Provides more information about the V CCBAT pin connection recommendations.
Provides more information about the V CCBAT pin connection recommendations.
Provides more information about battery specifications.
(16)
(17)
V CCBAT is a dedicated power supply for volatile key storage. V CCBAT continuously supplies power to the volatile
register regardless of the on-chip supply condition.
Third-party vendors offer in-socket programming.
Configuration, Design Security, and Remote System Upgrades in Stratix V Devices
Send Feedback
Altera Corporation