System and method of using a protected non-volatile memory
First Claim
Patent Images
1. A system comprising:
- a processor;
a volatile memory accessible to the processor;
a first nonvolatile memory accessible to the processor, the first nonvolatile memory including;
a first portion of memory that is protected and that is accessible during power up of the system when a shield bit indicates an unshielded mode of operation, but, after the first portion of memory is accessed and before execution of program code by the processor, the first portion of memory is inaccessible when the shield bit indicates a shielded mode of operation; and
a second portion of memory that is unprotected and that is readable regardless of a value of the shield bit;
a second nonvolatile memory, the second nonvolatile memory including the program code to be transferred to the volatile memory; and
external test interface protection logic responsive to an external test clock input, wherein the shield bit is set to the shielded mode of operation after detection that a number of cycles of the external test clock input exceeds a threshold;
wherein a key set is stored within the first portion of memory, the key set comprising an authentication key to authenticate the program code and a decryption key to decrypt the program code when the program code is encrypted.
25 Assignments
0 Petitions
Accused Products
Abstract
The disclosure includes a system and method of using a processor and protected memory. In a particular embodiment, the system includes a processor, a volatile memory accessible to the processor, and a first nonvolatile memory accessible to the processor. The first nonvolatile memory includes a first portion of memory that is protected and is readable when a shield bit indicates an unshielded mode of operation, but is unreadable when the shield bit indicates a shielded mode of operation and a second portion of memory that is unprotected and that is readable regardless of the value of the shield bit. The system includes a second nonvolatile memory including data to be transferred to the volatile memory.
36 Citations
22 Claims
-
1. A system comprising:
-
a processor; a volatile memory accessible to the processor; a first nonvolatile memory accessible to the processor, the first nonvolatile memory including; a first portion of memory that is protected and that is accessible during power up of the system when a shield bit indicates an unshielded mode of operation, but, after the first portion of memory is accessed and before execution of program code by the processor, the first portion of memory is inaccessible when the shield bit indicates a shielded mode of operation; and a second portion of memory that is unprotected and that is readable regardless of a value of the shield bit; a second nonvolatile memory, the second nonvolatile memory including the program code to be transferred to the volatile memory; and external test interface protection logic responsive to an external test clock input, wherein the shield bit is set to the shielded mode of operation after detection that a number of cycles of the external test clock input exceeds a threshold; wherein a key set is stored within the first portion of memory, the key set comprising an authentication key to authenticate the program code and a decryption key to decrypt the program code when the program code is encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A memory device comprising:
-
a shield bit storage; a first memory, the first memory including; a first portion that is protected and that is accessible based on a value of a shield bit from the shield bit storage, and a second portion that is unprotected and that is accessible independent of the value of the shield bit; and a second memory to store program code; wherein the first portion of the first memory includes a key set comprising an authentication key to authenticate the program code and a decryption key to decrypt the program code when the program code is encrypted; wherein the value of the shield bit at power up of the memory device indicates an unshielded mode of operation that allows access to the first portion of the first memory; and wherein the value of the shield bit is changed to indicate a shielded mode of operation where the first portion of the first memory is inaccessible when a number of test cycles of an external test clock input exceeds a threshold. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method comprising:
-
powering up a processor device having access to a memory device, wherein the memory device comprises; a shield bit storage including a shield bit; a first memory including; a protected portion that is accessible based on a value of the shield bit, wherein the protected portion is in an unshielded mode upon powerup of the processor device, wherein the protected portion is accessible to the processor conditioned on the protected portion being in the unshielded mode, and wherein the protected portion is inaccessible to the processor when the protected portion is in a shielded mode, and an unprotected portion that is accessible to the processor independent of the value of the shield bit; and a second memory configured to store program code, wherein the protected portion includes a key set comprising; an authentication key to authenticate the program code, and a decryption key to decrypt the program code when the program code is encrypted; and changing a mode from the unshielded mode to the shielded mode in response to a number of test cycles of an external clock input detected at the processor device exceeding a threshold. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification