10.06.2016 Views

eldo_user

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Eldo Netlist Setup<br />

Protection of Encrypted Libraries<br />

Protection of Encrypted Libraries<br />

An improved IP protection system is available for IP providers, providing an additional level of<br />

protection compared to simple encryption available through the encrypt_<strong>eldo</strong> utility. The device<br />

model libraries provided by IP providers (typically foundries) often contain process sensitive<br />

information such as SPICE device models, equations, technology parameters, and so on. These<br />

may be encrypted, but there is no easy way to restrict the usage of these encrypted model<br />

libraries. In particular, there is no way to restrict the allowed duration of usage.<br />

The purpose of the enhanced IP protection system is to enable an IP provider to ship encrypted<br />

and licensed model libraries to their customers, independent of Mentor Graphics. The licensing<br />

mechanism might be a standard commercial license managing system. Using the system, the IP<br />

provider can control the usage of its model libraries in exactly the same way that any<br />

commercial software is controlled, using features, license files, expiration dates, and so on. The<br />

system is designed in such a way that Mentor Graphics does not have to know the final end<strong>user</strong>s,<br />

nor generate any keys nor licenses. The IP provider creates and provides both the<br />

encrypted IP (the model libraries) and an “IP access library.” The IP access library is a dynamic<br />

load library (compiled C code). Mentor Graphics does not interfere with the encryption process,<br />

nor the license generation, maintenance, renewals, and so on, which are the entire responsibility<br />

of the IP provider.<br />

Preparing and Installing a Protected Library<br />

Lists the steps involved in preparing and installing a vendor-specific protected/encrypted<br />

library.<br />

Procedure<br />

1. The vendor, or IP provider, prepares a single IP access library. This is a dynamic load<br />

library coded in C.<br />

2. The vendor then prepares and encrypts the Eldo library source for each library the<br />

vendor wishes to distribute.<br />

3. The <strong>user</strong> installs the vendor-specific IP access library and the vendor protected/<br />

encrypted libraries.<br />

4. The <strong>user</strong> then installs the licensing software and keys provided by the IP vendor.<br />

144<br />

Eldo® User's Manual, 15.3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!