Securely downloading and executing code from mutually suspicious

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380286, 705 64, 705 67, 705 71, 709230, 709237, 717 11, 713150, 713168, 713180, G06F 1130

Patent

active

061675210

ABSTRACT:
An apparatus, system and method for secure code-downloading and information exchange, in the full generality of complex code dependencies while considering the implications of mutual distrust and hot-swapping. Included are secure techniques wherein an authority signs code from another party upon which that authority depends in order to establish that a trusted execution environment, is being preserved. Trusted code is employed to ensure that proprietary data is destroyed, disabled, and/or made unreadable, when a change causes the trusted execution environment to cease holding to a certain security level. A carefully constructed key structure is employed to ensure that communications allegedly from particular code in a particular environment can be authenticated as such. Authenticity of code that decides the authenticity of public-key signatures, and/or the authenticity of other code is cared for. In particular, the loading code that performs these tasks may itself be reloadable. Authenticity is maintained in physically secure coprocessors with multiple levels of dependent software that is independently downloadable by mutually suspicious authorities, and in physically secure coprocessors whose software has sufficient richness and complexity so as to be certainly permeable. Recoverability is provided for physically secure coprocessors from code of arbitrary evil running at arbitrary privilege.

REFERENCES:
patent: 4218582 (1980-08-01), Hellman et al.
patent: 5057996 (1991-10-01), Cutler et al.
patent: 5412717 (1995-05-01), Fischer
patent: 5493682 (1996-02-01), Tyra et al.
patent: 5557518 (1996-09-01), Rosen
patent: 5808625 (1998-09-01), Picott et al.
patent: 5825877 (1998-10-01), Dan et al.
patent: 5852666 (1998-12-01), Miller et al.
patent: 5929864 (1999-07-01), Picott et al.
patent: 6058478 (2000-05-01), Davis
patent: 6088797 (2000-07-01), Rosen
Federal Information Processing Standards Publication, Security Requirements For Cryptogra. Modules, US Dept. of Commerce, Jan. 11, 1994, FIPS PUB 140-1, p. 1-56.
Schneier, Applied Cryptography, 2nd edition, p. 185-186, Oct. 1995.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Securely downloading and executing code from mutually suspicious does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Securely downloading and executing code from mutually suspicious, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Securely downloading and executing code from mutually suspicious will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1006806

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.