Synopsys XSC OTP NVM IP: SecretCode Architecture

The Synopsys XSC One Time Programmable (OTP) Non-Volatile Memory (NVM) IP, based on the SecretCode architecture, employs a patented antiFuse bitcell operating on gate oxide breakdown as a programming mechanism. The IP can be manufactured without any additional masks or process steps, making it cost effective, reliable, and scalable. The bitcell is intrinsically secure, making it virtually impossible to distinguish between programmed and unprogrammed locations upon visual inspection.

The SecretCode architecture is specifically engineered for applications requiring high security. It incorporates many security features to enhance content protection against passive, semi-invasive, and invasive attacks.

Collectively, technology and security capabilities make the SecretCode architecture an excellent choice for secure applications requiring storage of protected code or data, or for secure storage of encryption keys required for authentication.

The SecretCode architecture is designed for ease-of-integration into an SoC and delivered as a single hard macro including voltage regulators and a high voltage charge pump1 for programming.

No external voltages need to be supplied except for power.

Production test flow is simplified and reduced to two essential tests and content programming.

Programming occurs at individual (single) bit granularity.

The SecretCode architecture’s reliability is qualified to meet or exceed 10 years data retention per JEDEC/JESD standards for continuous operation at the maximum specified operating temperatures. Characterization of skewed silicon material assures the specified performance parameters.

Synopsys XSC OTP NVM IP – SecretCode Architecture

 

Highlights
  • Memory capacity: 16 Kbits, 32 Kbits
  • Output data bus: 16 bits
  • Dual power supply: VDD and VDDIO
  • Embedded charge pump
  • Factory and field programming
  • Single bit programming
  • Minimum data retention of 10 years
  • Low standby and active current
  • Advanced security features implemented for the most demanding secure applications