Method and system for microprocessor data security
First Claim
1. A method of retrieving data, the method comprising:
- reading at least one byte of stored data from a memory associated with a processor;
for each byte read, performing a logic operation on the byte using a decryption key to generate a decrypted byte, wherein the decryption key is encoded in a dedicated key circuit accessible to the processor; and
providing each decrypted byte to the processor for processing thereof.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention relate generally to methods and systems for microprocessor data security, involving data encryption and decryption of stored data in, or in communication with, a computer microprocessor. Such encryption and decryption can be performed on a per-byte basis. Such encryption and decryption involves performing a logic operation on the byte using a decryption key or encryption key to generate a respective decrypted byte or encrypted byte. The key can be fixed or variable or a combination of both. The key is encoded in a dedicated hard-wired key circuit within the microprocessor and accessible to encryption and decryption circuitry within the microprocessor.
-
Citations
56 Claims
-
1. A method of retrieving data, the method comprising:
-
reading at least one byte of stored data from a memory associated with a processor;
for each byte read, performing a logic operation on the byte using a decryption key to generate a decrypted byte, wherein the decryption key is encoded in a dedicated key circuit accessible to the processor; and
providing each decrypted byte to the processor for processing thereof. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of storing data, the method comprising:
-
receiving at least one byte of data to be stored in a memory associated with a processor;
for each byte received, performing a logic operation on the byte using an encryption key to generate an encrypted byte, wherein the encryption key is encoded in a dedicated key circuit accessible to the processor; and
storing each encrypted byte in the memory. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. Computing apparatus comprising:
-
a processor;
a non-volatile memory accessible to the processor for storing at least one byte of data;
encryption circuitry configured to receive data to be stored in the non-volatile memory, encrypt each received byte based on a key by using a first logic operation and pass each encrypted byte to the non-volatile memory for storage;
decryption circuitry configured to receive encrypted bytes of data from the non-volatile memory, decrypt each byte based on the key using a second logic operation that is an inverse of the first logic operation and pass each decrypted byte to the processor; and
a key circuit having the key formed therein and accessible to the encryption circuitry and the decryption circuitry. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
Specification