×

Systems and methods for authenticating and protecting the integrity of data streams and other data

  • US 10,025,953 B2
  • Filed: 06/21/2016
  • Issued: 07/17/2018
  • Est. Priority Date: 12/14/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for securely evaluating authenticity of software, comprising:

  • a protected processing environment comprising;

    a processor,non-volatile memory, volatile memory,a tamper-resistant barrier, anda root verification key stored in a manner that is resistant to tampering;

    a storage medium storing a data block, said data block at least in part including executable instructions for execution by the processor;

    a storage location storing a signed root check value and two or more check values, said signed root check value and two or more check values being in a hierarchy of check values, each of said check values having been derived at least in part from a sub-block of said data block or from a plurality of check values in the hierarchy of check values;

    input verification logic, said input verification logic protected against tampering, said input verification logic operable to;

    authenticate said signed root check value at least in part using said root verification key,verify the integrity of said two or more check values at least in part using the authenticated root check value or a verified check value in the hierarchy of check values,verify the integrity of a sub-block of said data block using at least one of said verified check values, andrelease said sub-block of said data block from the tamper resistant processing environment for execution by the processor based at least in part on authenticating said signed root check value, verifying the integrity of said two or more check values, and verifying the integrity of said sub-block;

    one or more storage locations configured to store said authenticated root check value and said two or more verified check values in a manner that is resistant to tampering; and

    logic to determine whether to remove a verified check value from tamper resistant storage based at least in part on the verified check value'"'"'s level in a tree of hierarchical check values.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×