Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption
Reexamination Certificate
2011-08-30
2011-08-30
Chea, Philip J (Department: 2492)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Computer instruction/address encryption
C713S171000, C380S045000
Reexamination Certificate
active
08010804
ABSTRACT:
A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key. The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key. The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image. To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the encrypted and signed program code image. The encrypted binding key is then decrypted with a sixth key to extract the binding key. The hash value of the application verification certificate associated with the second key is then calculated and used with the extracted binding key to extract the first key. The extracted first key is then used to decrypt the encrypted application code.
REFERENCES:
patent: 2002/0053024 (2002-05-01), Hashimoto et al.
Davis, Don “Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML” Proceedings of the General Track: 2002 USENIX Annual Technical Conference, Year of Publication: 2001, ISBN:1-880446-09-X, pp. 65-78 (21 pages) www.world.std.com/˜dtd/sign—encrypt/sign—encrypt7.html.
Zhang, Zhenfeng and Denggup Feng “Key Replacement Attack on a Certificateless Signature Scheme” Cryptology ePrint Archive, Report 2006/453 (5 Pages) eprint.iacr.org/2006/453.pdf.
Murase Masana
Plouffe, Jr. Wilfred Edmund
Shimizu Kanna
Chea Philip J
Hamilton & Terrile LLP
International Business Machines - Corporation
Terrile Stephen A.
LandOfFree
Method to protect secrets against encrypted section attack does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method to protect secrets against encrypted section attack, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to protect secrets against encrypted section attack will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2670034