The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 27, 2018

Filed:

Feb. 25, 2016
Applicant:

Qualcomm Incorporated, San Diego, CA (US);

Inventors:

Roberto Avanzi, Munich, DE;

David Hartley, Seaview Downs, AU;

Rosario Cammarota, San Diego, CA (US);

Assignee:

QUALCOMM Incorporated, San Diego, CA (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 12/14 (2006.01); G06F 21/62 (2013.01); G06F 21/78 (2013.01); G06F 11/07 (2006.01); G06F 11/16 (2006.01); G06F 11/30 (2006.01);
U.S. Cl.
CPC ...
H04L 63/061 (2013.01); G06F 11/0727 (2013.01); G06F 11/167 (2013.01); G06F 11/3037 (2013.01); G06F 12/1408 (2013.01); G06F 21/6218 (2013.01); G06F 21/78 (2013.01); G06F 2212/1052 (2013.01);
Abstract

In an aspect, a method for protecting software includes obtaining a payload including at least one of instructions or data, establishing a realm in a memory device, encrypting the payload based on an ephemeral encryption key (EEK) associated with the realm, and storing the encrypted payload in the realm of the memory device. In another aspect, a method for protecting software includes receiving a memory transaction associated with the memory device, the memory transaction including at least a realm identifier (RID) and a realm indicator bit, obtaining the EEK associated with the RID when the RID indicates the realm and when the realm indicator bit is enabled, decrypting an instruction and/or data retrieved from the realm based on the EEK when the memory transaction is a read transaction, and encrypting second data for storage in the realm based on the EEK when the memory transaction is a write transaction.


Find Patent Forward Citations

Loading…