System and method for authenticating software using hidden...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S172000, C713S150000

Reexamination Certificate

active

06961852

ABSTRACT:
A processing unit includes a read-only encryption key. Loader code image is loaded into system memory from non-volatile storage. Loader code image includes a prefix value and a suffix value. The prefix value is combined with the master key from the processing unit to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.

REFERENCES:
Flip-chip interconnection technology for advanced thermal conduction modules Ray, S.K.; Beckham, K.; Master, R.; Electronic Components and Technology Conference, 1991. Proceedings., 41st May 11-16, 1991 Page(s): 772-778.
The scalability of an object descriptor architecture OODBMS Yu, K.K.; Lee, B.S.; Olson, M.R.; Database Engineering and Applications, 1999, IDEAS '99. International Symposium Proceedings Aug. 2-4, 1999 Page(s): 370-377.
Reducing radio energy consumption of key management protocols for wireless sensor networks Lai, B.-C.C.; Hwang, D.D.; Kim, S.P.; Verbauwhede, I.;Low Power Electronics and Design, 2004. ISLPED '04. Proceedings of the 2004 International Symposium on.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for authenticating software using hidden... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for authenticating software using hidden..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for authenticating software using hidden... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3508440

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.