Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-11-01
2005-11-01
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S172000, C713S150000
Reexamination Certificate
active
06961852
ABSTRACT:
A processing unit includes a read-only encryption key. Loader code image is loaded into system memory from non-volatile storage. Loader code image includes a prefix value and a suffix value. The prefix value is combined with the master key from the processing unit to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.
REFERENCES:
Flip-chip interconnection technology for advanced thermal conduction modules Ray, S.K.; Beckham, K.; Master, R.; Electronic Components and Technology Conference, 1991. Proceedings., 41st May 11-16, 1991 Page(s): 772-778.
The scalability of an object descriptor architecture OODBMS Yu, K.K.; Lee, B.S.; Olson, M.R.; Database Engineering and Applications, 1999, IDEAS '99. International Symposium Proceedings Aug. 2-4, 1999 Page(s): 370-377.
Reducing radio energy consumption of key management protocols for wireless sensor networks Lai, B.-C.C.; Hwang, D.D.; Kim, S.P.; Verbauwhede, I.;Low Power Electronics and Design, 2004. ISLPED '04. Proceedings of the 2004 International Symposium on.
Gerhardt Diana L.
Jung David
Leeuwen Joseph T. Van
Van Leeuwen & Van Leeuwen
LandOfFree
System and method for authenticating software using hidden... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for authenticating software using hidden..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for authenticating software using hidden... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3508440