Microprocessor with program and data protection function...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C712S213000, C712S014000, C712S027000

Reexamination Certificate

active

07065215

ABSTRACT:
In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.

REFERENCES:
patent: 4278837 (1981-07-01), Best
patent: 4465901 (1984-08-01), Best
patent: 4847902 (1989-07-01), Hampson
patent: 5224166 (1993-06-01), Hartman, Jr.
patent: 5825878 (1998-10-01), Takahashi et al.
patent: 6311270 (2001-10-01), Challener et al.
patent: 6745166 (2004-06-01), Sugahara et al.
patent: 0 583 140 (1994-02-01), None
patent: 2 122 777 (1984-01-01), None
patent: 11-282756 (1999-10-01), None
patent: WO 00/26791 (2000-05-01), None
“UWXAFS Binary Format Data Files”, 1999, [Retrieved from Internet Mar. 21, 2005], http://depts.washington.edu/uwxafs/Docs/fileh/fileh-3.html.
Design and implementation of a private and public key crypto processor and its application to a security system Ho Won Kim; Sunggu Lee; Consumer Electronics, IEEE Transactions on vol. 50, Issue 1, Feb. 2004 Page(s):214-224.
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor Aydos, M.; Yanik, T.; Koc, C.K.; Communications, IEE Proceedings- vol. 148, Issue 5, Oct. 2001 Page(s):273-279.
A high-speed ECC-based wireless authentication on an ARM microprocessor Aydos, M.; Yantk, T.; Koc, C.K.; Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference Dec. 11-15, 2000 Page(s):401-409.
D. J. Albert, et al., IEEE Computer Society, vol. 17, No. 4, XP-001108824, pp. 68-73, “Combatting Software Piracy by Encryption and Key Management ”, Apr. 1984.
D. Aucsmith, et al, Proceedings 1996 Intel Software Developer's Conference, pp. 317-333, “Tamper Resistant Software: An Implementation”, 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Microprocessor with program and data protection function... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Microprocessor with program and data protection function..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Microprocessor with program and data protection function... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3638982

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.