Methods and systems for securing data processing devices
First Claim
Patent Images
1. A method for operating a device comprising the steps of:
- storing an encrypted program in a non-volatile memory;
obtaining, by a first processor, a decryption key from a second processor;
decrypting said program and storing said decrypted program in a volatile memory; and
executing said program from said volatile memory.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for improving the security of devices to prevent unauthorized access to designs and software code are described.
28 Citations
18 Claims
-
1. A method for operating a device comprising the steps of:
-
storing an encrypted program in a non-volatile memory;
obtaining, by a first processor, a decryption key from a second processor;
decrypting said program and storing said decrypted program in a volatile memory; and
executing said program from said volatile memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A processing device comprising:
-
a non-volatile memory storing an encrypted program;
a first processor for obtaining a decryption key and decrypting said program; and
a volatile memory for storing said decrypted program, wherein said processor executes said program from said volatile memory. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A device comprising:
-
a means for storing an encrypted program in a non-volatile memory;
a means for obtaining, by a first processor, a decryption key from a second processor;
a means for decrypting said program and storing said decrypted program in a volatile memory; and
a means for executing said program from said volatile memory.
-
Specification