Visible to Intel only — GUID: sss1399552284240
Ixiasoft
1. Intel® MAX® 10 FPGA Configuration Overview
2. Intel® MAX® 10 FPGA Configuration Schemes and Features
3. Intel® MAX® 10 FPGA Configuration Design Guidelines
4. Intel® MAX® 10 FPGA Configuration IP Core Implementation Guides
5. Dual Configuration Intel® FPGA IP Core References
6. Unique Chip ID Intel® FPGA IP Core References
7. Document Revision History for the Intel® MAX® 10 FPGA Configuration User Guide
3.1. Dual-Purpose Configuration Pins
3.2. Configuring Intel® MAX® 10 Devices using JTAG Configuration
3.3. Configuring Intel® MAX® 10 Devices using Internal Configuration
3.4. Implementing ISP Clamp in Intel® Quartus® Prime Software
3.5. Accessing Remote System Upgrade through User Logic
3.6. Error Detection
3.7. Enabling Data Compression
3.8. AES Encryption
3.9. Intel® MAX® 10 JTAG Secure Design Example
Visible to Intel only — GUID: sss1399552284240
Ixiasoft
2.2.2.4. Verify Protect
Verify Protect is a security feature to enhance CFM security. When you enable the Verify Protect, only program and erase operation are allowed on the CFM. This capability protects the CFM contents from being copied.
You can turn on the Verify Protect feature when converting the .sof file to .pof file in the Intel® Quartus® Prime Convert Programming File tool.