Implementation of a secure computing environment by using a...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S190000, C713S189000, C713S169000, C726S012000, C726S022000, C726S034000

Reexamination Certificate

active

10335315

ABSTRACT:
A computer system with a secure bootloading function is disclosed. Security logic (20) is implemented on-chip with a central processing unit (CPU) (10), and performs security functions following a system reset, such as upon power-up or a hardware or software reset. A security key value from a security key store (36), which is read-protected from subsequent read accesses, is used to authenticate each code block associated with secure applications. Write-protect registers (34) store the memory addresses of authenticated code blocks, so that these code blocks cannot be altered. A shadow memory (32) is provided on-chip with the CPU (10), to which access is granted for program instructions having a physical memory address within the memory address ranges stored in the write-protect registers (34), and thus usable by the secure applications. Successful authentication of the user code block ensures that the bootloaded code is not corrupt, prior to passing control to the operating system.

REFERENCES:
patent: 6363486 (2002-03-01), Knapton, III
patent: 6381732 (2002-04-01), Burnham et al.
patent: 6938164 (2005-08-01), England et al.
patent: 2002/0147916 (2002-10-01), Strongin et al.
patent: 2002/0166062 (2002-11-01), Helbig
patent: 2003/0005277 (2003-01-01), Harding et al.
Gwennap, Linley. “Alpha 21364 to Ease memory Bottleneck” (Oct. 1998) Microdesign Resources.
A.J. Menezes, P.C. van oorschot, S.A. Vanstone “Handbook of Applied Cryptography” (1997) CRC Press. Section 11.3.1-11.3.3.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Implementation of a secure computing environment by using a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Implementation of a secure computing environment by using a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Implementation of a secure computing environment by using a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3825999

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.