Cloning protection for electronic equipment
First Claim
1. A method for preventing cloning of an electronic device, said method comprising steps of:
- generating a first electronic signature from a first identification code and a second identification code, the second identification code being suitable for uniquely identifying a hardware component of the electronic device;
decrypting an encrypted electronic signature for generating a second electronic signature;
comparing the first electronic signature and the second electronic signature; and
departing from normal operation of the electronic device if the first electronic signature and the second electronic signature differ.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for protecting electronic devices from cloning employs an electronic signature generated from an identification code for the electronic device (e.g., an electronic serial number (ESN), an international mobile equipment identifier (IMEI), or the like) and a unique, unchangeable identification for a hardware component of the electronic device code (e.g., a flash hardware serial number, or the like). The electronic signature is encrypted and stored to the non-volatile memory of the electronic device for verifying the authenticity of the electronic device'"'"'s identification code to prevent use of the device for cloning a second electronic device.
-
Citations
36 Claims
-
1. A method for preventing cloning of an electronic device, said method comprising steps of:
-
generating a first electronic signature from a first identification code and a second identification code, the second identification code being suitable for uniquely identifying a hardware component of the electronic device;
decrypting an encrypted electronic signature for generating a second electronic signature;
comparing the first electronic signature and the second electronic signature; and
departing from normal operation of the electronic device if the first electronic signature and the second electronic signature differ. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for preventing a first non-volatile memory of a first electronic device from being cloned to a second non-volatile memory of a second electronic device, the method comprising steps of:
-
retrieving a first identification code from the first electronic device, the first identification code for uniquely identifying a hardware component of the first electronic device;
assigning a second identification code for the first electronic device, the second identification code for uniquely identifying the first electronic device;
generating an electronic signature from the first identification code and the second identification code;
encrypting the electronic signature; and
storing the encrypted electronic signature and the second identification code to the first non-volatile memory, the encrypted electronic signature and the second identification code being used for departing from normal operation of the second electronic device if the second non-volatile memory is cloned from the first non-volatile memory. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An electronic device, comprising:
-
a non-volatile memory; and
a controller for controlling operation of the electronic device, wherein the controller is suitable for generating a first electronic signature from a first identification code and a second identification code, the first identification code being suitable for uniquely identifying a hardware component of the electronic device;
decrypting an encrypted electronic signature for generating a second electronic signature;
comparing the first electronic signature and the second electronic signature, and causing the electronic device to depart from normal operation if the first electronic signature and the second electronic signature differ. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. An electronic device, comprising:
-
means for generating a first electronic signature from a first identification code and a second identification code, the first identification code being suitable for uniquely identifying a hardware component of the electronic device;
means for decrypting an encrypted electronic signature for generating a second electronic signature;
means for comparing the first electronic signature and the second electronic signature, and means for departing from normal operation of the electronic device if the first electronic signature and the second electronic signature differ. - View Dependent Claims (35, 36)
-
Specification