ARCHITECURE, SYSTEM, AND METHOD FOR OPERATING ON ENCRYPTED AND/OR HIDDEN INFORMATION
First Claim
1. A memory architecture, comprising:
- an unprotected memory space configured to store encrypted information, said encrypted information corresponding to a plain text version thereof, said unprotected memory space is located outside a microprocessor;
a message digest corresponding to said encrypted information;
a first protected memory space configured to store at least a subset of operating system instructions, said first protected memory space is located outside said microprocessor; and
a second protected memory space configured to store said plain text version of said encrypted information, said second protected memory space is located outside said microprocessor;
wherein said operating system instructions in said first protected memory space operate on said plain text version of said encrypted information in said second protected memory space;
wherein a random access memory comprises said unprotected memory space, said first protected memory space, and said second protected memory space.
2 Assignments
0 Petitions
Accused Products
Abstract
An architecture, system and method for operating on encrypted and/or hidden information (e.g., code and/or data). The invention enables creators, owners and/or distributors of proprietary code to keep such code inaccessible to users and user-controlled software programs. A memory architecture includes first and second protected memory spaces, respectively storing operating system instructions and a decrypted version of the encrypted information. The first protected memory space may further store a table linking the locations of the encrypted and/or hidden, decrypted information with a decryption and/or authorization key. The system includes the memory architecture and a processor for executing instructions, and the method loads, stores and operates on the encrypted and/or hidden information according to the memory architecture functionality and/or constraints.
151 Citations
20 Claims
-
1. A memory architecture, comprising:
-
an unprotected memory space configured to store encrypted information, said encrypted information corresponding to a plain text version thereof, said unprotected memory space is located outside a microprocessor; a message digest corresponding to said encrypted information; a first protected memory space configured to store at least a subset of operating system instructions, said first protected memory space is located outside said microprocessor; and a second protected memory space configured to store said plain text version of said encrypted information, said second protected memory space is located outside said microprocessor; wherein said operating system instructions in said first protected memory space operate on said plain text version of said encrypted information in said second protected memory space; wherein a random access memory comprises said unprotected memory space, said first protected memory space, and said second protected memory space. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for operating on encrypted information, comprising:
-
a microprocessor; and a memory architecture of comprising; an unprotected memory space configured to store encrypted information, said encrypted information corresponding to a plain text version thereof, said unprotected memory space is located outside said microprocessor; a message digest corresponding to said encrypted information; a first protected memory space configured to store at least a subset of operating system instructions, said first protected memory space is located outside said microprocessor; and a second protected memory space configured to store said plain text version of said encrypted information, said second protected memory space is located outside said microprocessor, wherein said operating system instructions in said first protected memory space operate on said plain text version of said encrypted information in said second protected memory space; wherein said microprocessor is configured to execute said operating system instructions; wherein a hard drive comprises said unprotected memory space, said first protected memory space, and said second protected memory space. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of operating on encrypted information, comprising:
-
transferring said encrypted information to a first protected memory address inaccessible to a user-accessible software program, but accessible to an operating system instruction set, said first protected memory address is located outside a microprocessor; if said encrypted information comprises encrypted information, decrypting said encrypted information to form a decrypted version of said encrypted information, said decrypting comprises a message digest; and storing said first protected memory address in a second protected memory address inaccessible to a user-accessible software program, but accessible to an operating system instruction set, wherein said second protected memory address is linked to an original location of said encrypted information, said second protected memory address is located outside said microprocessor; wherein a detachable electronically erasable and programmable memory comprises said first protected memory address and said second protected memory address. - View Dependent Claims (18, 19, 20)
-
Specification