Claims
- 1. A method for selectively activating the function of a computer chip, said method comprising the steps of:
- providing a computer module in the form of a multichip module or an integrated circuit chip wherein said computer module includes a plurality of programmable features;
- storing a secure code unique to the computer module in a first register on said computer module, said secure code including unique codes for each of said plurality of programmable features;
- receiving a key code in a second register, said key code indentifying a feature or features of said computer module to be enabled;
- comparing said key code to said secure code on said computer chip; and
- evaluating results of said comparing step, wherein if said key code matches said secure code, a feature or features identified by said key code are enabled.
- 2. A method, as recited in claim 1, wherein the secure code and the key code comprise keys in a public-key cryptographic algorithm.
- 3. A method, as recited in claim 2, wherein said secure code is encoded by a customizable array of fuses.
- 4. A method, as recited in claim 3, wherein said customizable array of fuses comprises fusible links.
- 5. A method, as recited in claim 2, wherein said secure code is stored in a programmable read only memory.
- 6. A method, as recited in claim 2, further comprising the steps of:
- providing a plurality of computer chips;
- connecting a first of said computer chips to a second of said computer chips if said first computer chip and said second computer chip have at least one programmable feature in common, wherein said first computer chip and the common programmable feature have been previously enabled but said second computer chip and the corresponding common programmable feature have not been enabled; and
- enabling the second of said computer chips and the corresponding common programmable feature if the first of said computer chips fails.
- 7. A method, as recited in claim 2, wherein said computer module further stores a configuration constant and implements said public key cryptographic algorithm, said secure code and said configuration constant being encrypted in combination using said cryptographic algorithm to produce a configuration signature, said configuration signature being unique for each computer module.
- 8. A method, as recited in claim 7, wherein said key code includes a public key, a signed configuration signature and configuration data.
- 9. A method, as recited in claim 8, wherein said comparing of said key code includes deciphering said signed configuration signature so that said configuration constant stored in said computer module can be compared to said received and deciphered configuration constant.
- 10. A method, as recited in claim 9, wherein said received configuration data is used to identify which one of said programmable features is enabled.
- 11. A method, as recited in claim 10, further comprising:
- providing a plurality of computer chips;
- connecting a first of said computer chips to a second of said computer chips if said first computer chip and said second computer chip have at least one programmable feature in common, wherein said first computer chip and the common programmable feature have been previously enabled but said second computer chip and the corresponding common programmable feature have not been enabled; and
- enabling the second of said computer chips and the corresponding common programmable feature if the first of said computer chips fails.
CROSS REFERENCE TO RELATED APPLICATION
This application is a divisional of application Ser. No. 08/290,697 filed Aug. 15, 1994.
US Referenced Citations (2)
Number |
Name |
Date |
Kind |
4817140 |
Chandra et al. |
Mar 1989 |
|
5148534 |
Comerford |
Sep 1992 |
|
Divisions (1)
|
Number |
Date |
Country |
Parent |
290697 |
Aug 1994 |
|