5.2 Control Logic
Access to the user zones occurs only through the device’s control logic. This logic is configurable through access registers, key registers, and keys programmed into the configuration memory during device personalization. Also implemented in the control logic is a cryptographic engine for performing the various higher-level security functions of the device.