9–74
Chapter 9: Configuration, Design Security, and Remote System Upgrades in the Cyclone III Device Family
Remote System Upgrade
No Key Operation
Only unencrypted configuration bitstreams are allowed to configure the device.
FACTORY Mode
After power up, Cyclone III LS devices must be in
FACTORY
mode to program the
volatile key. The
FACTORY
private JTAG instruction must be issued after the device
successfully exits from POR and before the device starts loading the core
configuration data to enable access to all other instructions from the JTAG pins. The
device configuration data and AES volatile key are cleared if the
FACTORY
instruction
is executed.
lists the configuration bitstream and the configuration mode supported for
each security mode.
Table 9–25. Security Modes Supported
Mode
Function
Configuration
File
Allowed Configuration Mode
PS with AES (without decompression).
FPP with AES (without decompression).
Secure
Volatile Key
Board-Level
Testing
No Key
FACTORY
—
Volatile Key
Programming
Encrypted
Remote update fast AS with AES
(without decompression).
Fast AS (without decompression).
Unencrypted
Unencrypted
—
All configuration modes that do not
engage the design security feature.
All configuration modes that do not
engage the design security feature.
—
Remote System Upgrade
Cyclone III devices support remote system upgrade in AS and AP configuration
schemes. Cyclone III LS devices support remote system upgrade in the AS
configuration scheme only. Remote system upgrade can also be implemented with
advanced Cyclone III features such as real-time decompression of configuration data
in the AS configuration scheme.
■
The serial configuration device uses the AS configuration scheme to configure
Cyclone III or Cyclone III LS devices
The supported parallel flash uses the AP configuration scheme to configure
Cyclone III devices
Remote system upgrade is not supported in the multi-device configuration chain
for any configuration scheme.
■
■
Cyclone III Device Handbook
Volume 1
August 2012 Altera Corporation