Where the owner name is not linked, that owner no longer owns the brand
Technical Examples
Described are various methods and systems for encrypting/decrypting configuration data for programmable logic devices. In configuration data defining a number of separately encrypted subdesigns, or "cores," each subdesign includes a shared password or a unique authentication code to ensure the designs belong together. Other embodiments prohibit the overwriting of configuration memory to prevent the inclusion of unauthorized designs. Still other embodiments protect key secrecy while enabling users to read, write, and verify the keys.