Associating software with hardware using cryptography

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S188000, C713S189000

Reexamination Certificate

active

08041957

ABSTRACT:
Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software ID, and hardware ID. A code image is formed with the software, software ID, code signature, and a certificate. The certificate contains cryptographic information used to authenticate the certificate and validate the code signature. The code image is loaded onto a device. The device validates the software to hardware association prior to executing the software. For the validation, the device authenticates the certificate with a certificate authority public key embedded within the device. The device also validates the code signature using the cryptographic information contained in the certificate, information in the code image, and the hardware ID embedded within the device.

REFERENCES:
patent: 4658093 (1987-04-01), Hellman
patent: 5398285 (1995-03-01), Borgelt et al.
patent: 5638446 (1997-06-01), Rubin
patent: 6243468 (2001-06-01), Pearce et al.
patent: 6510236 (2003-01-01), Crane et al.
patent: 6711684 (2004-03-01), Moroney et al.
patent: 6728880 (2004-04-01), Sites
patent: 6931545 (2005-08-01), Ta et al.
patent: 7321957 (2008-01-01), Khan et al.
patent: 2002/0001384 (2002-01-01), Buer et al.
patent: 2002/0136401 (2002-09-01), Hoffstein et al.
patent: 2002/0150253 (2002-10-01), Brezak et al.
patent: 2003/0225960 (2003-12-01), Guu et al.
patent: 2005/0018472 (2005-01-01), Lim
patent: 2005/0033959 (2005-02-01), Zheng et al.
patent: 2005/0091520 (2005-04-01), Khan et al.
patent: 2005/0138400 (2005-06-01), Sheriff et al.
patent: 0809244 (1997-11-01), None
patent: 2404263 (2005-01-01), None
patent: 2405007 (2005-02-01), None
patent: 10083297 (1998-03-01), None
patent: 10301773 (1998-11-01), None
patent: 10311773 (1998-11-01), None
patent: 11345117 (1999-12-01), None
patent: 2001-216042 (2001-08-01), None
patent: 2001243062 (2001-09-01), None
patent: 200223876 (2002-01-01), None
patent: 2002312052 (2002-10-01), None
patent: 200384984 (2003-03-01), None
patent: 9608092 (1996-03-01), None
patent: 9915947 (1999-04-01), None
patent: WO0075759 (2000-12-01), None
patent: WO0219598 (2002-03-01), None
patent: WO2004075525 (2004-09-01), None
Preston Gralla, How The Internet Works, Sep. 2001, Que, 6thb edition, pp. 303-307.
Message Authenticatio using Hash Functions-The HMAC ConstructionMihir et al; RSA Laboratories CryptoBytes, Vo. 2, No. 1, Spring 1996.
Cryptographic Message Syntax StandardRSA Laboratories Technicol Note, Version 1.5, Revised Nov. 1, 1993.
HMAC: Keyed Hashing for Message AuthenticationH. Krawczyk, et al. Network Working Group, Request for Comments: 2104; Category: Informational , Feb. 1997.
Keying Hash Functions for Message AuthenticationBellare et al., Advances in Cryptology-Crypto 96, Proceedings, Lecture Notes in Cumputer Sciences vol. 1109, N. Koblitz ed. Springer-Verlag, Jun. 1996.
International Preliminary Report on Patent-PCT/USO4/010867, International Search Authority-IPEA/US-Mar. 6, 2006.
International Search Report-PCT/US04/010867, International Search Authority-ISA/US-Sep. 29, 2005.
Menezes, Oorschot, Vanstone: “Handbook of Applied Cryptograhy” CRC Series on Discrete Mathematics and Its Applications, 1997, pp. 555-556, 559-560, 39, XP002521729.
Supplementary European Search Report-EP04749901, Berlin Patent Office-Mar. 30, 2009.
Written Opinion-PCT/US04/010867, International Search Authority-ISA/US-Sep. 29, 2005.
Federal Information Processing Standard (FIPS) Pub 180-1, “Secure Hash Standard,” Apr. 17, 1995.
Federal Information Processing Standard (FIPS) Pub 186, “Digital Signature Standard (DSS),” May 19, 1994.
Federal information Processing Standards (FIPS) Pub 198, “The Keyed-Hash Message Authentication Code (HMAC)” Mar. 6, 2002.
RFC 1321, “The MD5 Message-Digest Algorithm” Divest, Apr. 1992.
RFC 2459, “Internet X.509 Public Key Infrastructive Certificate and CFL Profile,” Housley, et al., Jan. 1999.
Translation of Office Action in Japan application 2006-509824 Corresponding to U.S. Appl. No. 10/815,256, citing JP2001243062, JP200384984, JP10311773, JP11345117, JP2002312052, Nozawa—Basic—Knowledge—pp.—124—129—year—2000 and JP200223876 dated Mar. 22, 2011.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Associating software with hardware using cryptography does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Associating software with hardware using cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Associating software with hardware using cryptography will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4257650

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.