Secure bootloader for securing digital devices
First Claim
Patent Images
11. A method for ensuring a secure code re-authoring session during the boot process in a digital device comprising:
- A. obtaining a first key and a second key;
B. reading an encrypted object file;
C. computing a first mapping value with said read encrypted object file;
D. decrypting said read encrypted object file;
E. re-encrypting said decrypted object file;
F. storing said re-encrypted object file in a memory;
G. computing a second mapping value with said re-encrypted object file;
H. comparing said first computed mapping value with a mapping value associated with said encrypted object file;
I. storing second mapping value if said comparison was equal; and
J. asserting an error message if said comparison was not equal.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure bootloader for securing software and systems in a digital device 110 by ensuring only encrypted and authenticated boot software is loaded and executed in the digital device 110. The encrypted boot software is read into the device 110 and authenticated. If the boot software is not authenticated, then the digital device 110 does not boot.
222 Citations
25 Claims
-
11. A method for ensuring a secure code re-authoring session during the boot process in a digital device comprising:
-
A. obtaining a first key and a second key;
B. reading an encrypted object file;
C. computing a first mapping value with said read encrypted object file;
D. decrypting said read encrypted object file;
E. re-encrypting said decrypted object file;
F. storing said re-encrypted object file in a memory;
G. computing a second mapping value with said re-encrypted object file;
H. comparing said first computed mapping value with a mapping value associated with said encrypted object file;
I. storing second mapping value if said comparison was equal; and
J. asserting an error message if said comparison was not equal. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
18-1. A method according to claim 11, wherein said steps B-G are performed on a portion of said encrypted object file at a time and are repeated until said encrypted objected file is completed.
-
20. A digital device for playing secured content with a built-in apparatus for securing said digital device comprising:
-
a first storage location for storing content;
a memory for storing program files;
a processor, coupled to said first storage and said memory, to processor configured to decode said content, the processor further comprising;
a read-only memory;
a secure storage location, including an identifier stored therein;
an encryption/decryption circuit, for encrypting and decrypting data using said identifier; and
a mapping value generator, for generating mapping values based on said data for use in authenticating said data. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification