Work Plan

Process Overview

  1. Common Vocabulary
    1. Use Cases
    2. Glossary
    3. Reference Flow(s)
  2. Liaison Activities
    1. P1800 SystemVerilog
    2. P1076 VHDL
    3. EDIF
  3. Technology Review
    1. Pragma markup structure
    2. Key Management
    3. License Management
    4. Identity and Trust models
    5. Rights Management
  4. Recommendations
    1. End-user recommendations
    2. Standards Coordination recommendations
  5. Inter-operability Issues
    1. Validation Suite development
  6. Draft Development
    1. Outline Structure
    2. Draft Writing
    3. Review
    4. Revise and recirculate as needed
    5. Approve ballot draft
  7. Balloting
    1. Form Ballot Group
    2. Submit ballot draft
    3. Review ballot comments
    4. Revise and recirculate as needed
    5. Approve RevCom submission

Work items

  1. A processing model for transformative tools. How do we balance the functional expectations for synthesis and other transformative tools with the demand for iron-clad security for protected IP?
    1. Do SDF files need to be generaged in encrypted form for protected blocks?
    2. What is the implication of the implied supply network of a UPF power region that contains protected IP
  2. A transitive protection model that flows from the tool key. What kinds of data need to be unlocked from that key (rights_block, data_block, digest_block), and how do we handle block specific keys (data session, digest, rights, etc).
  3. Recovering the original Verilog key_block syntax to implement transitive protection. Can this be done without a more complicated key_block?
  4. Applying encryption methods/keys to external content. A form of external reference in place of a data_block could also cover the use cases where the target file content does not have a suitable standard for IP encryption and rights management.
  5. An extended description framework for IP. Without duplicating the work of other standards, what can be done to improve IP management by producers and consumers. Structured data support in place of IP-author defined string content for:
    1. Support for signing protected IP for authentication purposes, and addressing the risk of trojan substitutions.
    2. Support for versioning and expiration of the protected envelope.
  6. Finishing the Key Management support, and extending the markup syntax if needed.
  7. What information is deemed to be protected under encryption.
    1. Language-neutral guidelines.
    2. Language-specific recommendations to working groups.
    3. Recommendations for partially protected constructs.
    4. What binding rules should apply at the boundaries of protected IP
    5. What behavior should be expected from assertions that fire from protected IP
    6. Do tool outputs and error messages have any privileged status over user-written PLI

Tentative Schedule

Topic Work Item(s) Timeline
Publishing interim recommendations   2Q10
Completing Key Management 6 1Q11
Security model 1,2,4,7 2Q10
IP Flow model 5,7 2Q10
Licensing Updates   3Q10 - 4Q10
Close of Donations   Jan 31, 2011
Rights Management   3Q10 - 1Q11
End-user recommendations   1Q11
LRM updates and liaison   4Q10 - 2Q11
Draft completion   2Q11
Form Ballot group   2Q11
Ballot and publish   3Q11

-- StevenDovich - 23 Jul 2008

Topic revision: r6 - 2010-12-13 - 15:56:51 - StevenDovich
 
Copyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback