Protection for customer programs (EPROM)
First Claim
1. A method of protecting information, comprising:
- encrypting the information by using a first algorithm and a first key,storing the encrypted information in a first portion of a memory unit;
encrypting the first key with a second algorithm and second key;
storing the encrypted first key in a second portion of the memory unit;
retrieving the encrypted first key with a processing unit having stored therein the first algorithm, the first key and the second algorithm;
decrypting the first key using the second algorithm and the second key; and
decrypting the information using the first algorithm and the first key.
1 Assignment
0 Petitions
Accused Products
Abstract
Proprietary information such as programs and/or data are protected using a secure processing system that includes a memory such as an EPROM in which the proprietary information is stored in a first portion of the memory. The stored information is encrypted by an encryption algorithm unique to the proprietor of the information. The stored information is assigned an unique key that will enable the information to be decrypted if the unique algorithm is known. A second portion of the memory has the unique key stored therein, the unique key is encrypted with a master encryption algorithm and can only be obtained by using a master key with the master algorithm. A processing unit such as a Digital Signal Processor (DSP) has both the proprietor'"'"'s unique algorithm, master algorithm and master key available to it. The processing unit can retrieve the information from the memory and execute it after decrypting the unique key using the master algorithm and the master key and then decrypting the information using the unique algorithm and the unique key.
187 Citations
1 Claim
-
1. A method of protecting information, comprising:
-
encrypting the information by using a first algorithm and a first key, storing the encrypted information in a first portion of a memory unit; encrypting the first key with a second algorithm and second key; storing the encrypted first key in a second portion of the memory unit; retrieving the encrypted first key with a processing unit having stored therein the first algorithm, the first key and the second algorithm; decrypting the first key using the second algorithm and the second key; and decrypting the information using the first algorithm and the first key.
-
Specification