Cryptography – Key management
Reexamination Certificate
2006-06-20
2006-06-20
Jung, David (Department: 2134)
Cryptography
Key management
C712S213000, C712S014000, C712S027000
Reexamination Certificate
active
07065215
ABSTRACT:
In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.
REFERENCES:
patent: 4278837 (1981-07-01), Best
patent: 4465901 (1984-08-01), Best
patent: 4847902 (1989-07-01), Hampson
patent: 5224166 (1993-06-01), Hartman, Jr.
patent: 5825878 (1998-10-01), Takahashi et al.
patent: 6311270 (2001-10-01), Challener et al.
patent: 6745166 (2004-06-01), Sugahara et al.
patent: 0 583 140 (1994-02-01), None
patent: 2 122 777 (1984-01-01), None
patent: 11-282756 (1999-10-01), None
patent: WO 00/26791 (2000-05-01), None
“UWXAFS Binary Format Data Files”, 1999, [Retrieved from Internet Mar. 21, 2005], http://depts.washington.edu/uwxafs/Docs/fileh/fileh-3.html.
Design and implementation of a private and public key crypto processor and its application to a security system Ho Won Kim; Sunggu Lee; Consumer Electronics, IEEE Transactions on vol. 50, Issue 1, Feb. 2004 Page(s):214-224.
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor Aydos, M.; Yanik, T.; Koc, C.K.; Communications, IEE Proceedings- vol. 148, Issue 5, Oct. 2001 Page(s):273-279.
A high-speed ECC-based wireless authentication on an ARM microprocessor Aydos, M.; Yantk, T.; Koc, C.K.; Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference Dec. 11-15, 2000 Page(s):401-409.
D. J. Albert, et al., IEEE Computer Society, vol. 17, No. 4, XP-001108824, pp. 68-73, “Combatting Software Piracy by Encryption and Key Management ”, Apr. 1984.
D. Aucsmith, et al, Proceedings 1996 Intel Software Developer's Conference, pp. 317-333, “Tamper Resistant Software: An Implementation”, 1996.
Fujimoto Kensaku
Hashimoto Mikio
Ozaki Satoshi
Shirakawa Kenji
Teramoto Keiichi
Jung David
Kabushiki Kaisha Toshiba
LandOfFree
Microprocessor with program and data protection function... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Microprocessor with program and data protection function..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Microprocessor with program and data protection function... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3638982