System and method for securing information in memory
First Claim
1. An apparatus configured to secure information in a memory of an electronic device, comprising:
- a first memory having stored therein a cryptographic hash algorithm;
a second memory having stored therein information related to the identification of an electronic device;
a third memory having stored therein a first hash value calculated by operation of the cryptographic hash algorithm on the stored information; and
a processor for calculating, in response to an occurrence of a predetermined event, a second hash value of the stored information according to the stored cryptographic hash algorithm, and for comparing the second hash value to the first hash value, wherein normal operation of the electronic device is disabled if the second hash value does not match the first hash value.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securing information in the memory of an electronic device. A terminal identifier that identifies the device is stored in memory in the device. Also stored in memory of the device is a cryptographic hash algorithm and a hash value that is calculated from the application of the hash algorithm against the terminal identifier. The terminal identifier, the hash algorithm, and the hash value are all stored in protected memory within the electronic device with the protected memory being read only memory or one time programmable memory. In response to the occurrence of an event on the electronic device, such as at time of device power-up, the hash algorithm is applied against the stored terminal identifier, with the resultant hash value being compared against the stored hash value. If the two hash values fail to match, normal operation of the device is disabled.
-
Citations
32 Claims
-
1. An apparatus configured to secure information in a memory of an electronic device, comprising:
-
a first memory having stored therein a cryptographic hash algorithm;
a second memory having stored therein information related to the identification of an electronic device;
a third memory having stored therein a first hash value calculated by operation of the cryptographic hash algorithm on the stored information; and
a processor for calculating, in response to an occurrence of a predetermined event, a second hash value of the stored information according to the stored cryptographic hash algorithm, and for comparing the second hash value to the first hash value, wherein normal operation of the electronic device is disabled if the second hash value does not match the first hash value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 27, 28, 29, 30)
-
-
12. An electronic device with a processor and a memory, wherein a cryptographic hash algorithm is stored on the processor, information identifying the electronic device is stored in the memory, and a hash value according to the cryptographic hash algorithm and the identifying information is stored in the memory;
- and wherein, if the stored cryptographic hash algorithm later calculates a hash value of the stored identifying information that fails to match the stored hash value, a normal operation of the electronic device is disabled.
-
13. A method for securing information in the memory of a device, comprising:
-
storing a cryptographic hash algorithm in a memory on a device;
storing information in a memory on the device;
storing a first hash value in a memory on the device;
in response to an occurrence of a predetermined event on the device, calculating a second hash value according to the stored information and the stored cryptographic hash algorithm;
comparing the second hash value to the first hash value; and
disabling normal operation of the device if the second hash value does not match the first hash value.
-
-
25. A computer readable medium encoded with software to secure information in the memory of an electronic device by storing a cryptographic hash algorithm in a memory on an electronic device;
- storing information in a memory on the electronic device;
storing a first hash value in a memory on the electronic device;
in response to an occurrence of a predetermined event on the electronic device, calculating a second hash value according to the stored information and the stored cryptographic hash algorithm;
comparing the second hash value to the first hash value; and
disabling a normal operation of the electronic device if the second hash value does not match the first hash value.
- storing information in a memory on the electronic device;
-
26. A method for securing information in the memory of a device, comprising:
-
storing a cryptographic hash algorithm in a memory on a device;
storing information in a memory on the device;
storing serial number information in a memory on the device;
storing in a memory on the device a first hash value calculated by the cryptographic hash algorithm based on said stored information and said serial number information;
in response to an occurrence of a predetermined event on the device, calculating a second hash value according to the stored cryptographic hash algorithm;
comparing the second hash value to the first hash value; and
disabling a normal operation of the device if the second hash value does not match the first hash value.
-
-
31. A method for securing information in the memory of an electronic device, comprising:
-
storing a cryptographic hash algorithm in a memory on an electronic device;
storing control information in a memory on the electronic device;
storing in a memory on the electronic device a first hash value calculated from the control information according to the cryptographic hash algorithm;
in response to an occurrence of a predetermined event on the electronic device, calculating a second hash value according to the stored cryptographic hash algorithm;
comparing the second hash value to the first hash value; and
disabling a normal operation of the electronic device if the second hash value does not match the first hash value.
-
-
32. An apparatus configured to secure information in a memory of an electronic device, comprising:
-
a first memory having stored therein a cryptographic hash algorithm;
a second memory having stored therein information related to the operation of an electronic device;
a third memory having stored therein a first hash value calculated by operation of the cryptographic hash algorithm on the stored information; and
a processor for calculating, in response to an occurrence of a predetermined event, a second hash value of the stored information according to the stored cryptographic hash algorithm, and for comparing the second hash value to the first hash value, wherein normal operation of the electronic device is disabled if the second hash value does not match the first hash value.
-
Specification