English
Language : 

EP2AGX95EF29C6N Datasheet, PDF (354/380 Pages) Altera Corporation – Device Interfaces and Integration
9–68
Chapter 9: Configuration, Design Security, and Remote System Upgrades in Arria II Devices
Design Security
Table 9–27 lists the configuration schemes that support the design security feature
both for volatile key and non-volatile key programming.
Table 9–27. Design Security Configuration Schemes Availability
Configuration Scheme
Configuration Method
FPP
MAX II device or microprocessor and flash memory
AS
Serial configuration device
Fast AS
Serial configuration device
MAX II device or microprocessor and flash memory
PS
Download cable
JTAG (2)
MAX II device or microprocessor and flash memory
Download cable
Notes to Table 9–27:
(1) In this mode, the host system must send a DCLK that is x4 the data rate.
(2) JTAG configuration supports only unencrypted configuration file.
Design
Security
v (1)
v
v
v
v
—
—
You can use the design security feature with other configuration features, such as the
compression and remote system upgrade features. When you use compression with
the design security feature, the configuration file is first compressed and then
encrypted using the Quartus II software. During configuration, the Arria II device
first decrypts and then decompresses the configuration file.
Arria II Device Handbook Volume 1: Device Interfaces and Integration
July 2012 Altera Corporation