Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2002-04-16
2004-08-24
Barron, Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S176000, C713S194000
Reexamination Certificate
active
06782477
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to software copy protection and schemes for securing communication protocols, and more specifically, to the use of a tamperproof hardware cryptography circuit to ensure the integrity of copy protection and to secure communication protocol messages and structures used in online communications, such as online games.
2. Discussion of the Related Art
Computer entertainment game systems, such as the Sony PlayStation® and PlayStation® 2, have become some of the most successful consumer electronics products to hit store shelves in recent years. Unfortunately, along with such success comes the increased potential for abuse by those who seek to improperly tamper with the systems and associated software. Such abuse is motivated by a warped desire among some to modify certain games in certain ways to achieve peculiar or unusual results, and perhaps even to profit illegally from the sale and/or distribution of such modified software. Clearly, one of the issues that is of major concern to game publishers is the piracy of their software because such modifications can lead to circulation of inconsistent versions of software among the public, which can cause confusion and even damage to the reputation and integrity of game publishers.
There is also a potential for abuse with respect to online or network enabled game systems. For example, a hacker or prankster may perform a so-called “man in the middle” attack whereby the hacker seeks to intercept a message that is being communicated over a network (e.g. the Internet) between two game systems. The hacker may be motivated by a desire to cheat or to disrupt play of the game by the two legitimate users. Again, such abuse can disadvantageously cause confusion and wreak havoc among innocent users, which can ultimately lead to an unjustified distrust by the public of the systems and games themselves.
It is with respect to these and other background information factors that the present invention has evolved.
SUMMARY OF THE INVENTION
The present invention advantageously addresses the needs above as well as other needs by providing a method of operating a system. The method includes the steps of: reading a portion of software code from a storage device in the system, wherein the portion of software code has been digitally signed with a first key prior to entering the system; sending the portion of the software code to a cryptography unit contained in a tamperproof circuit associated with the system; decrypting a signature file corresponding to the portion of the software code with the cryptography unit using a second key stored in the tamperproof circuit to form a decrypted signature file; determining whether the portion of the software code is valid by using the decrypted signature file; and preventing operation of the system if the portion of the software code is not valid.
In another embodiment, the invention can be characterized as a processor based system that comprises a storage device, a tamperproof circuit, a cryptography unit contained in the tamperproof circuit, and processing circuitry. The processing circuitry is configured to read a portion of software code from the storage device that has been digitally signed with a first key prior to entering the system, and to send the portion of the software code to the cryptography unit. The cryptography unit is configured to decrypt a signature file corresponding to the portion of the software code using a second key stored in the tamperproof circuit, and to determine whether the portion of the software code is valid. The processing circuitry is further configured to prevent operation of the system if the portion of the software code is not valid.
In another embodiment, a method of operating a system comprises the steps of: receiving a first key in the system from a remote server across a network; reading a portion of encrypted code from a storage device in the system; sending the portion of the encrypted code to a cryptography unit contained in a tamperproof circuit associated with the system; decrypting the portion of the encrypted code with the cryptography unit using the first key to form decrypted code; and communicating across the network using the decrypted code.
In another embodiment, a processor based system comprises a storage device, a tamperproof circuit, a cryptography unit contained in the tamperproof circuit, and processing circuitry. The processing circuitry is configured to receive a first key from a remote server across a network, read a portion of encrypted code from the storage device, and send the portion of the encrypted code to the cryptography unit. The cryptography unit is configured to decrypt the portion of the encrypted code using the first key to form decrypted code, and the processing circuitry is further configured to communicate across the network using the decrypted code.
A better understanding of the features and advantages of the present invention will be obtained by reference to the following detailed description of the invention and accompanying drawings which set forth an illustrative embodiment in which the principles of the invention are utilized.
REFERENCES:
patent: 4593384 (1986-06-01), Kleijne
patent: 5689565 (1997-11-01), Spies et al.
patent: 5956408 (1999-09-01), Arnold
patent: 5991399 (1999-11-01), Graunke et al.
patent: 6021202 (2000-02-01), Anderson et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6292569 (2001-09-01), Shear et al.
patent: 6389538 (2002-05-01), Gruse et al.
patent: 6567917 (2003-05-01), Ziese
International Search Authority; “Notification of the International Search Report”; “PCT International Search Report”; cited in corresponding PCT application for U.S. application No. 10/123,923; date of mailing Jun. 24, 2003; (5 pages).
Sony Corporation; “Memory Stick Copyright Protection Technology—MagicGate—Key Technology for Digital Content”; Cx-News Sony Semiconductor News Magazine; Copyright 2002; pp. 1-6; vol. 20; Internet address: http://www.sony.net/Products/SC-HP/CXPAL/CXNEWS-20/PDF/TW.pdf.
Barron Gilberto
Song Computer Entertainment America Inc.
Zand Kambiz
LandOfFree
Method and system for using tamperproof hardware to provide... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for using tamperproof hardware to provide..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for using tamperproof hardware to provide... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3304535