Method of protecting a password from unauthorized access and data processing unit
First Claim
Patent Images
1. Method of protecting a password from unauthorized access, comprising:
- providing data representing at least a portion of a password;
embedding the data into at least one of a plurality of instructions wherein the data is embedded into the plurality of instructions such that no data fetch operation is required;
storing the plurality of instructions as processor executable code in the memory; and
preventing read-out of the processor executable code as data from the memory;
wherein the processor executable code includes additional instructions to carry out security related processes.
7 Assignments
0 Petitions
Accused Products
Abstract
A method of protecting a password from unauthorized access and a data processing unit are provided. An embodiment of the method of protecting a password from unauthorized access comprises storing data representing at least a portion of a password in a memory, assigning the data to at least one of a plurality of instructions, storing the plurality of instructions as processor executable code in the memory, and preventing read-out of the processor executable code as data from the memory.
-
Citations
19 Claims
-
1. Method of protecting a password from unauthorized access, comprising:
-
providing data representing at least a portion of a password; embedding the data into at least one of a plurality of instructions wherein the data is embedded into the plurality of instructions such that no data fetch operation is required; storing the plurality of instructions as processor executable code in the memory; and preventing read-out of the processor executable code as data from the memory; wherein the processor executable code includes additional instructions to carry out security related processes. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Method of protecting a password from unauthorized access, comprising:
-
distributing data representing at least a portion of a password into a plurality of data portions; embedding each of the data portions with at least one of a plurality of instructions, thereby providing a plurality of instructions with embedded data portions, wherein the data portions are embedded into the plurality of instructions such that no data fetch operation is required; storing the plurality of instructions with embedded data portions as processor executable code in a memory; and preventing read-out of the processor executable code as data from the memory; wherein the processor executable code includes additional instructions to carry out security related processes. - View Dependent Claims (9, 10, 11)
-
-
12. Data processing unit comprising:
-
a memory to store data representing at least a portion of a password, the memory further to store a plurality of instructions as processor executable code; a control unit to embed the data into at least one of the plurality of instructions, wherein the data is embedded into the at least one of the plurality of instructions such that no data fetch operation is required; and a circuit arrangement to prevent read-out of the processor executable code as data from the memory; wherein the processor executable code includes additional instructions to carry out security related processes. - View Dependent Claims (13, 14, 15, 16)
-
-
17. Data processing unit comprising:
-
a control unit to distribute data representing at least a portion of a password into a plurality of data portions, the control unit further to embed each of the data portions into one of a plurality of instructions thereby providing a plurality of instructions with embedded data portions, wherein the data is embedded into one of the plurality of instructions such that no data fetch operation is required; a memory to store the plurality of instructions with embedded data portions as processor executable code; and a circuit arrangement to prevent read-out of the processor executable code as data from the memory; wherein the processor executable code includes additional instructions to carry out security related processes. - View Dependent Claims (18, 19)
-
Specification