Secure method for processing content stored within a component, and corresponding component
First Claim
Patent Images
1. A method for processing content stored on a component, the method comprising:
- modifying a first partition of a first memory with a first key, the first partition comprising booting instructions to be executed in response to the component being powered up;
modifying a second partition of the first memory with a second key, the second partition being different from the first partition, the second key being different from the first key, the second partition comprising protected user data;
storing the first key in a protected storage register of the component;
storing the second key in a first location of a non-volatile memory, the non-volatile memory being different from the first memory; and
storing a memory address of the first location of the non-volatile memory in the first partition of the first memory.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for processing content stored on a component is disclosed. A first partition of a first memory is encrypted with a first encryption key and a second partition of the first memory is encrypted with a second encryption key. The second encryption key is different from the first encryption key. The first encryption key is stored in a storage register of the component and the second encryption key is stored in a first location of a non-volatile memory. A memory address of the first location is stored in the first partition of the first memory.
-
Citations
20 Claims
-
1. A method for processing content stored on a component, the method comprising:
-
modifying a first partition of a first memory with a first key, the first partition comprising booting instructions to be executed in response to the component being powered up; modifying a second partition of the first memory with a second key, the second partition being different from the first partition, the second key being different from the first key, the second partition comprising protected user data; storing the first key in a protected storage register of the component; storing the second key in a first location of a non-volatile memory, the non-volatile memory being different from the first memory; and storing a memory address of the first location of the non-volatile memory in the first partition of the first memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A component, comprising:
-
a first memory, comprising; a first partition encrypted with a first key, the first partition comprising booting instructions to be executed in response to the component being powered up; and a second partition different from the first partition and encrypted with a second key, the second key different from the first key, the second partition comprising protected user data; a protected storage register storing the first key, wherein a value of the first key is configured to reset the protected storage register; and a non-volatile memory comprising the second key stored in encrypted form in a first location of the non-volatile memory, wherein a memory address of the first location of the non-volatile memory is stored in the first partition of the first memory. - View Dependent Claims (14, 15)
-
-
16. An integrated circuit card, comprising:
a component, comprising; a first memory comprising a first partition encrypted with a first key, and a second partition encrypted with a second key, the second key different from the first key; a storage register configured to store the first key, the first partition comprising booting instructions to be executed in response to the component being powered up, the second partition comprising protected user data; a non-volatile memory different from the first memory and the storage register and comprising a first partition and a second partition, the second partition encrypted with a third key different from the first key and the second key, wherein; the second key is stored in a first location of the first partition of the non-volatile memory; a memory address of the first location is stored in the first partition of the first memory; and the third key is stored in the second partition of the first memory; and a processor configured to decrypt the first partition of the first memory using the first key, decrypt the second partition of the first memory using the second key, and decrypt the second partition of the non-volatile memory using the third key. - View Dependent Claims (17, 18, 19, 20)
Specification