Information related to electronic design automation may be exchanged in a
secure manner. Information deemed sensitive and otherwise worthy of
protection may be secured by methods such as encryption, obfuscation and
other security measures. The secured information may be processed without
revealing at least some of the secured information. For instance, rule
files related to integrated circuit manufacturability may be selectively
annotated to indicate portions thereof deserving of protection. An
encryption tool may be used to secure the information related to
electronic design automation. An electronic design automation tool may
then unlock and use the secured information without revealing the same.
In one aspect, such access or secure use of the information may depend on
one or more conditions being met (e.g., a time period or a number of uses
or accesses). For instance, the tool may be a physical verification tool
capable of verifying whether any of the one or more integrated circuit
layouts may violate one or more of the secured rules.