Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2007-12-25
2007-12-25
Zia, Syed A. (Department: 2131)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S190000, C713S189000, C713S169000, C726S012000, C726S022000, C726S034000
Reexamination Certificate
active
10335315
ABSTRACT:
A computer system with a secure bootloading function is disclosed. Security logic (20) is implemented on-chip with a central processing unit (CPU) (10), and performs security functions following a system reset, such as upon power-up or a hardware or software reset. A security key value from a security key store (36), which is read-protected from subsequent read accesses, is used to authenticate each code block associated with secure applications. Write-protect registers (34) store the memory addresses of authenticated code blocks, so that these code blocks cannot be altered. A shadow memory (32) is provided on-chip with the CPU (10), to which access is granted for program instructions having a physical memory address within the memory address ranges stored in the write-protect registers (34), and thus usable by the secure applications. Successful authentication of the user code block ensures that the bootloaded code is not corrupt, prior to passing control to the operating system.
REFERENCES:
patent: 6363486 (2002-03-01), Knapton, III
patent: 6381732 (2002-04-01), Burnham et al.
patent: 6938164 (2005-08-01), England et al.
patent: 2002/0147916 (2002-10-01), Strongin et al.
patent: 2002/0166062 (2002-11-01), Helbig
patent: 2003/0005277 (2003-01-01), Harding et al.
Gwennap, Linley. “Alpha 21364 to Ease memory Bottleneck” (Oct. 1998) Microdesign Resources.
A.J. Menezes, P.C. van oorschot, S.A. Vanstone “Handbook of Applied Cryptography” (1997) CRC Press. Section 11.3.1-11.3.3.
Brady F. James
Shaw Steven A.
Telecky, Jr. Frederick L.
Texas Instrument Incorporated
Zia Syed A.
LandOfFree
Implementation of a secure computing environment by using a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Implementation of a secure computing environment by using a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Implementation of a secure computing environment by using a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3825999