Specifications
Steps for Implementing a Secure Configuration Flow Page 23
Using the Design Security Features in Altera FPGAsJune 2012 Altera Corporation
How to Perform Multi-Device Volatile or Non-Volatile Key Programming Using
Quartus II Software
To perform multi-device volatile or non-volatile key programming using the
Quartus II software through the EthernetBlaster, perform the following steps:
1. Repeat Steps 1–5 in “How to Perform Single-Device Volatile or Non-Volatile Key
Programming Using Quartus II Software” on page 20.
2. Click Add File. The Select Programmer File dialog box appears (Figure 19).
a. Programming using single-device .ekp files:
i. Type <single_device>.ekp in the File name field.
ii. Click Open.
iii. Repeat Steps i–ii for the number of devices in the same chain.
iv. Highlight the .ekp files you added and click Program/Configure
(Figure 22).
1 For the correct sequence of the devices in the same JTAG chain, you can use
the Auto-Detect option in the Quartus II programmer.
b. Programming using a multi-device .jam file:
i. Type <multi_device>.jam in the File name field.
ii. Click Open.
iii. Highlight the .jam file you added and click Program/Configure
(Figure 23).
3. Repeat Steps 8–10 of “How to Perform Single-Device Volatile or Non-Volatile Key
Programming Using Quartus II Software” on page 20 to perform volatile or
non-volatile key programming.
Figure 22. Multi-Device Key Programming with .ekp Files
Ensure the right
device sequence is used
Example of two
Stratix IV devices
in one JTAG chain
selected for key
programming