Specifications
Steps for Implementing a Secure Configuration Flow Page 21
Using the Design Security Features in Altera FPGAsJune 2012 Altera Corporation
5. Click Hardware Setup. The Hardware Setup dialog box appears.
a. In the Currently selected hardware list, select EthernetBlaster as the
programming hardware.
b. Click Done.
6. Click Add File. The Select Programmer File dialog box appears.
a. Type <filename>.ekp in the File name field.
b. Click Open.
7. Highlight the .ekp file you added and click Program/Configure (Figure 20).
8. On the Tools menu, click Options. The Options dialog box appears (Figure 21).
9. In the Category list, click Programmer. You can choose to turn on or turn off the
Configure volatile design security key option to perform volatile or non-volatile
key programming.
10. Click OK to close the Options dialog box.
11. Click Start to program the key.
Figure 20. Programming the Key
Click Start to
program the key
Highlight the file and click
Program/Configure