# Test 1

***

#### **TEST 1**

**Test Case ID:** BIS-1.7.1\
**Test Name:** TC\_TEST\_INTELLECTUAL\_PROPERTY\_PROTECTION\_ENABLEMENT

***

**Objective**

To verify, in the presence of the OEM team, whether **Intellectual Property (IP) protection technologies** provided by the chip manufacturer are enabled and operational. If no such technologies are available, confirm this via a manufacturer’s declaration and assess whether alternative protection mechanisms are implemented.

***

**Tools Used**

* OEM-provided SoC datasheet and IP protection feature documentation
* SoC diagnostic/management commands or tools (e.g., register dump utilities, debug status tools)
* Logic analyzer or interface monitoring tools (if applicable)
* Manufacturer’s declaration (if IP protection not available)

***

**Test Execution Steps**

**With IP Protection Technologies:**

1. **Status Verification**
   * Use prescribed methods (e.g., SoC configuration register checks, CLI commands) to verify the operational status of IP protection technologies.
2. **Protection Effectiveness Test**
   * Attempt controlled reads or modifications of protected chip regions in OEM presence to verify access restrictions.
3. **Response Monitoring**
   * Observe DUT for alerts, access denials, security logs, or other responses confirming active IP protection.

**Without IP Protection Technologies:**

1. **Design Confirmation**
   * Verify via manufacturer’s declaration that no IP protection technology is integrated into the SoC.
2. **Alternative Measures Validation**
   * Confirm that alternative security mechanisms (e.g., firmware encryption, secure boot, licensing enforcement) are implemented to safeguard intellectual property.

***

**Expected Results for Pass**

* **With IP Protection:** IP protection technologies are enabled and verified as functional through operational testing.
* **Without IP Protection:** Manufacturer’s declaration is present, and alternative IP protection measures are in place.

***

**Test Observations**

*(Insert findings here — e.g., "Chip supports secure code encryption; configuration registers indicate feature enabled; attempts to read protected memory returned access denied errors.")*

***

**Evidence Provided**

* SoC register dump outputs / CLI command screenshots
* Logs of access denial attempts to protected regions
* Manufacturer’s signed declaration (if applicable)
* OEM verification sign-off

***

**Test Case Result**

☐ **Pass** – IP protection technologies enabled and functional / Manufacturer declaration validated\
☐ **Fail** – IP protection missing, disabled, or ineffective

***

**Overall Test Result**

*(Summarize outcome for BIS-1.7.1 — e.g., "IP protection enabled and verified; DUT meets requirement.")*

***
