Systems and methods for detecting tampering of a computer system by calculating a boot signature
First Claim
1. In a computer system configured to be capable of receiving presentable content, a method of detecting tampering of the computer system, the method comprising the following:
- a specific act of booting up the computer system;
a specific act of monitoring a signal sequence that occurs internal to the computer system during the specific act of booting up the computer system;
a specific act of calculating a boot signature that is a function of the signal sequence;
a specific act of comparing the calculated boot signature to an expected boot signature that represents no tampering to the computer system; and
a specific act of determining that tampering has not occurred if the calculated boot signature is the same as the expected boot signature.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer system that contains a boot signature checker is disclosed. In one example, the boot signature checker monitors the bus connecting the processor with the memory and provides a boot signature that is a function of the signal sequence detected on the bus. If an unauthorized user tampers with the operating system within the memory as when attempting to gain unauthorized access to presentable content such as television programming, the boot signature checker will in all probability produce a different boot signature than expected. The decrypter will respond to this different boot signature by, for example, deactivating thereby potentially preventing an unauthorized user from gaining access to presentable content.
276 Citations
32 Claims
-
1. In a computer system configured to be capable of receiving presentable content, a method of detecting tampering of the computer system, the method comprising the following:
-
a specific act of booting up the computer system;
a specific act of monitoring a signal sequence that occurs internal to the computer system during the specific act of booting up the computer system;
a specific act of calculating a boot signature that is a function of the signal sequence;
a specific act of comparing the calculated boot signature to an expected boot signature that represents no tampering to the computer system; and
a specific act of determining that tampering has not occurred if the calculated boot signature is the same as the expected boot signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 19, 20, 21, 22, 23, 24, 26, 27, 28, 30, 31, 32)
-
-
18. In a computer system configured to be capable of capable of receiving presentable, a method of detecting tampering of the computer system, the method comprising the following:
-
a specific act of booting up the computer system;
a step for calculating a boot signature that is a function of a signal sequence experienced internal to the computer system during the specific act of booting; and
a step for determining whether the calculated boot signature is indicative of the computer system being tampered with.
-
-
25. A computer system capable of receiving presentable content, wherein the computer system comprises:
-
a processing device;
a memory device;
a bus coupled to the processing device and the memory device;
a decrypter configured to decrypt encrypted content when activated;
a boot signature checker that is coupled to the bus so as to be able to read a signal sequence asserted on the local bus during booting of the receiver, wherein the boot signature checker is configured to calculate a boot signature that is a function of the signal sequence.
-
-
29. A computer system capable of decrypting encrypted content, wherein the receiver comprises:
-
a processing device;
a memory device;
a bus coupled to the processing device and the memory device;
a decrypter configured to decrypt encrypted content when activated; and
means for calculating a boot signature that is a function of the signal sequence experienced internal to the computer system during booting up of the computer system.
-
Specification