A method for protecting information in a device includes providing a
device with a non-secure hardware domain, a processor having a
software-controlled mode of operation, and a secure hardware domain
having a secure memory that is inaccessible by the processor when the
processor is operating in the software-controlled mode of operation. Data
from the non-secure hardware domain is established in the secure hardware
domain. Computing operations are executed on the data in the secure
hardware domain to produce a result. The secure hardware domain is
purged, while retaining the result therein. The result is thereafter
returned from the secure hardware domain into the non-secure hardware
domain.