9–74
Chapter 9: Configuration, Design Security, and Remote System Upgrades in the Cyclone III Device Family
Remote System Upgrade
No Key Operation
Only unencrypted configuration bitstreams are allowed to configure the device.
FACTORY Mode
After power up, Cyclone III LS devices must be in FACTORYmode to program the
volatile key. The FACTORYprivate JTAG instruction must be issued after the device
successfully exits from POR and before the device starts loading the core
configuration data to enable access to all other instructions from the JTAG pins. The
device configuration data and AES volatile key are cleared if the FACTORYinstruction
is executed.
Table 9–25 lists the configuration bitstream and the configuration mode supported for
each security mode.
Table 9–25. Security Modes Supported
Configuration
Mode
Function
Allowed Configuration Mode
File
PS with AES (without decompression).
FPP with AES (without decompression).
Secure
Encrypted
Remote update fast AS with AES
(without decompression).
Volatile Key
Fast AS (without decompression).
Board-Level
Testing
All configuration modes that do not
engage the design security feature.
Unencrypted
Unencrypted
—
All configuration modes that do not
engage the design security feature.
No Key
—
Volatile Key
Programming
FACTORY
—
Remote System Upgrade
Cyclone III devices support remote system upgrade in AS and AP configuration
schemes. Cyclone III LS devices support remote system upgrade in the AS
configuration scheme only. Remote system upgrade can also be implemented with
advanced Cyclone III features such as real-time decompression of configuration data
in the AS configuration scheme.
■
■
■
The serial configuration device uses the AS configuration scheme to configure
Cyclone III or Cyclone III LS devices
The supported parallel flash uses the AP configuration scheme to configure
Cyclone III devices
Remote system upgrade is not supported in the multi-device configuration chain
for any configuration scheme.
Cyclone III Device Handbook
Volume 1
August 2012 Altera Corporation