System and method of using a protected non-volatile memory
First Claim
1. A system comprising:
- a processor;
a volatile memory accessible to the processor;
a first nonvolatile memory accessible to the processor, the first nonvolatile memory including a first portion of memory that is protected and is readable when a shield bit indicates an unshielded mode of operation, but is unreadable when the shield bit indicates a shielded mode of operation and a second portion of memory that is unprotected and that is readable regardless of the value of the shield bit; and
a second nonvolatile memory, the second nonvolatile memory including data to be transferred to the volatile memory.
25 Assignments
0 Petitions
Accused Products
Abstract
The disclosure includes a system and method of using a processor and protected memory. In a particular embodiment, the system includes a processor, a volatile memory accessible to the processor, and a first nonvolatile memory accessible to the processor. The first nonvolatile memory includes a first portion of memory that is protected and is readable when a shield bit indicates an unshielded mode of operation, but is unreadable when the shield bit indicates a shielded mode of operation and a second portion of memory that is unprotected and that is readable regardless of the value of the shield bit. The system includes a second nonvolatile memory including data to be transferred to the volatile memory.
41 Citations
22 Claims
-
1. A system comprising:
-
a processor;
a volatile memory accessible to the processor;
a first nonvolatile memory accessible to the processor, the first nonvolatile memory including a first portion of memory that is protected and is readable when a shield bit indicates an unshielded mode of operation, but is unreadable when the shield bit indicates a shielded mode of operation and a second portion of memory that is unprotected and that is readable regardless of the value of the shield bit; and
a second nonvolatile memory, the second nonvolatile memory including data to be transferred to the volatile memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A memory device comprising:
-
a first portion of memory that is protected and is readable when a shield bit indicates an unshielded mode of operation, but is unreadable when the shield bit indicates a shielded mode of operation; and
a second portion of memory that is unprotected and that is readable regardless of the value of the shield bit. - View Dependent Claims (15, 16, 17)
-
-
18. A method of activating a processor device having access to a read only memory, the method comprising:
-
powering up the processor device, wherein the read only memory has a protected portion of memory that is shieldable but that is in an unshielded mode upon powerup;
reading a key set from the protected portion of memory in connection with performing a data transfer to a random access memory (RAM); and
after performing the data transfer, setting the protected portion of the memory to a shielded mode where the key set is no longer readable from the read only memory. - View Dependent Claims (19, 20, 21, 22)
-
Specification