Systems and methods using cryptography to protect secure computing environments
First Claim
1. A security method comprising:
- (a) digitally signing a first load module with a first digital signature designating the first load module for use by a first device class;
(b) digitally signing a second load module with a second digital signature different from the first digital signature, the second digital signature designating the second load module for use by a second device class having a tamper resistance and/or work factor substantially different from the tamper resistance and/or work factor of the first device class;
(c) distributing the first load module for use by at least one device in the first device class; and
(d) distributing the second load module for use by at least one device in the second device class.
2 Assignments
0 Petitions
Accused Products
Abstract
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.
272 Citations
43 Claims
-
1. A security method comprising:
-
(a) digitally signing a first load module with a first digital signature designating the first load module for use by a first device class;
(b) digitally signing a second load module with a second digital signature different from the first digital signature, the second digital signature designating the second load module for use by a second device class having a tamper resistance and/or work factor substantially different from the tamper resistance and/or work factor of the first device class;
(c) distributing the first load module for use by at least one device in the first device class; and
(d) distributing the second load module for use by at least one device in the second device class. - View Dependent Claims (2, 3, 4)
-
-
5. A software verifying method comprising:
-
(a) testing a load module having at least one specification associated therewith;
(b) verifying that the load module satisfies the specification; and
(c) issuing at least one digital certificate attesting to the results of the verifying step.
-
-
6. A method of authenticating a load module comprising:
-
(a) authenticating a first digital signature associated with the load module, including the step of employing a first one-way hash algorithm, a first decryption algorithm, and a first public key; and
(b) authenticating a second digital signature associated with the load module, including the step of employing at least one of;
(i) a second one-way hash algorithm that is dissimilar to the first one-way hash algorithm, (ii) a second decryption algorithm that is dissimilar to the first decryption algorithm, and (iii) a second public key that is dissimilar to the first public key. - View Dependent Claims (7, 8)
-
-
9. A protected processing environment comprising:
-
means for providing a tamper resistance enclosure, means for maintaining at least one public verification key within the tamper resistant enclosure, and means for authenticating load modules based, at least in part, on use of the public verification key.
-
-
10. A method of distinguishing between trusted and untrusted load modules comprising:
-
(a) receiving a load module, (b) determining whether the load module has an associated digital signature, (c) if the load module has an associated digital signature, authenticating the digital signature using at least one secret public key; and
(d) conditionally executing the load module based at least in part on the results of authenticating step (c).
-
-
11. A method of increasing the security of a virtual distribution environment comprising plural interoperable protected processing environments having different work factors, the method comprising:
-
(a) classifying the plural protected processing environments based on work factor, (b) distributing different verification public keys to different protected processing environments having different work factor classifications, and (c) using the distributed verification public keys to authenticate load modules, including the step of preventing protected processing environments having different work factor classifications from executing the same load module. - View Dependent Claims (12, 13, 14, 16, 17, 18, 20)
-
-
15. A protected processing comprising:
-
a tamper resistant barrier having a first work factor, and at least one arrangement within the tamper resistant barrier that prevents the protected processing environment from executing the same load module accessed by a further protected processing environment having a further tamper resistant barrier with a further work factor substantially different from the first work factor.
-
-
19. A method for protecting a computation environment surrounded by a tamper resistant barrier having a first work factor, the method including:
preventing the computation environment from using the same software module accessible by a further computation environment having a further tamper resistant barrier with a further work factor substantially different from the first work factor.
-
21. A method of protecting computation environments comprising:
-
(a) associating plural digital signatures with a load module;
(b) authenticating a first subset of the plural digital signatures with a first tamper resistant computation environment; and
(c) authenticating a second subset of the plural digital signatures with a second tamper resistant computation environment different from the first environment.
-
-
22. A computer security method comprising:
-
digitally signing, using a first digital signing technique, a first executable designating the first executable for use by a first device class; and
digitally signing, using a second digital signing technique different from the first digital signing, technique, a second executable designating the second executable for use by a second device class having a tamper resistance and/or work factor substantially different from the tamper resistance and/or work factor of the first device class. - View Dependent Claims (23, 24, 25, 28, 29)
-
-
26. A software verifying method comprising:
-
testing a executable having at least one specification associated therewith;
verifying that the executable satisfies the specification; and
issuing at least one digital certificate attesting to the results of the verifying step.
-
-
27. A method of authenticating a executable comprising
(a) authenticating a first digital signature associated with the executable, including the step of employing a first one-way hash algorithm, a first decryption algorithm, and a first public key; - and
(b) authenticating a second digital signature associated with the executable, including the step of employing at least one of;
(i) a second one-way hash algorithm that is dissimilar to the first one-way hash algorithm, (ii) a second decryption algorithm that is dissimilar to the first decryption algorithm, and (iii) a second public key that is dissimilar to the first public key.
- and
-
30. A secure execution space comprising:
-
means for providing a tamper resistant barrier, means for maintaining at least one public verification key within the tamper resistant barrier, and means for authenticating executables based, at least in part, on use of the public verification key.
-
-
31. A method of distinguishing between trusted and untrusted executables comprising:
-
(a) receiving a executable, (b) determining whether the executable has an associated digital signature, (c) if the executable has an associated digital signature, authenticating the digital signature using at least one secret public key; and
(d) conditionally executing the executable based at least in part on the results of authenticating step (c).
-
-
32. A method of increasing the security plural interoperable secure execution spaces having different work factors, the method comprising:
-
(e) classifying the plural secure execution spaces based on work factor, (f) distributing different verification public keys to different secure execution spaces having different work factor classifications, and (g) using the distributed verification public keys to authenticate executables, including the step of preventing secure execution spaces having different work factor classifications from executing the same executable. - View Dependent Claims (33, 34, 35, 37, 38, 39)
-
-
36. A protected processing comprising:
-
a tamper resistant barrier having a first work factor, and at least one arrangement within the tamper resistant barrier that prevents the secure execution space from executing the same executable accessed by a further secure execution space having a further tamper resistant barrier with a further work factor substantially different from the first work factor.
-
-
40. A method for protecting a computation environment surrounded by
a tamper resistant barrier having a first work factor, the method including: preventing the computation environment from using the same software module accessed by a further computation environment having a further tamper resistant barrier with a further work factor substantially different from the first work factor. - View Dependent Claims (41)
-
42. A method of protecting computation environments comprising:
-
(a) associating plural digital signatures with a executable;
(b) authenticating a first subset of the plural digital signatures with a first tamper resistant computation environment; and
(c) authenticating a second subset of the plural digital signatures with a second tamper resistant computation environment different from the first environment. - View Dependent Claims (43)
-
Specification