A method for protecting information in a device includes providing a device with a non-secure hardware domain, a processor having a software-controlled mode of operation, and a secure hardware domain having a secure memory that is inaccessible by the processor when the processor is operating in the software-controlled mode of operation. Data from the non-secure hardware domain is established in the secure hardware domain. Computing operations are executed on the data in the secure hardware domain to produce a result. The secure hardware domain is purged, while retaining the result therein. The result is thereafter returned from the secure hardware domain into the non-secure hardware domain.

 
Web www.patentalert.com

< SECURE OVERLAY MANAGER PROTECTION

> FAST UPDATE FOR HIERARCHICAL INTEGRITY SCHEMES

> MEMORY RANDOMIZATION FOR PROTECTION AGAINST SIDE CHANNEL ATTACKS

~ 00514