Architecture, system, and method for operating on encrypted and/or hidden information
First Claim
1. A memory comprising:
- an unprotected memory portion operable to store encrypted information; and
a protected memory portion operable to store an unencrypted form of said encrypted information, wherein said unencrypted form of said encrypted information is usable by an instruction if said instruction is at least one of predetermined instruction types stored in an encrypted form in said unprotected memory portion and if said instruction successfully passes an authorization procedure that uses a memory location of said encrypted form of said instruction in said unprotected memory portion.
2 Assignments
0 Petitions
Accused Products
Abstract
An architecture, system and method for operating on encrypted and/or hidden information (e.g., code and/or data). The invention enables creators, owners and/or distributors of proprietary code to keep such code inaccessible to users and user-controlled software programs. A memory architecture includes first and second protected memory spaces, respectively storing operating system instructions and a decrypted version of the encrypted information. The first protected memory space may further store a table linking the locations of the encrypted and/or hidden, decrypted information with a decryption and/or authorization key. The system includes the memory architecture and a processor for executing instructions, and the method loads, stores and operates on the encrypted and/or hidden information according to the memory architecture functionality and/or constraints.
-
Citations
20 Claims
-
1. A memory comprising:
-
an unprotected memory portion operable to store encrypted information; and a protected memory portion operable to store an unencrypted form of said encrypted information, wherein said unencrypted form of said encrypted information is usable by an instruction if said instruction is at least one of predetermined instruction types stored in an encrypted form in said unprotected memory portion and if said instruction successfully passes an authorization procedure that uses a memory location of said encrypted form of said instruction in said unprotected memory portion. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processor; and a memory comprising; an unprotected memory portion configured to store encrypted information; and a protected memory portion configured to store an unencrypted version of said encrypted information, wherein said processor is configured to execute an instruction to use said unencrypted version of said encrypted information if said instruction is at least one of predetermined instruction types stored in an encrypted form in said unprotected memory portion and if said instruction successfully passes an authorization procedure that uses a memory location of said encrypted form of said instruction in said unprotected memory portion. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
storing encrypted information in an unprotected memory portion; and storing an unencrypted version of said encrypted information in a protected memory portion, wherein said unencrypted version of said encrypted information is usable by an instruction if said instruction is at least one of predetermined instruction types stored in an encrypted form in said unprotected memory portion and if said instruction successfully passes an authorization procedure that uses a memory location of said encrypted form of said instruction in said unprotected memory portion. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification