System and method for cryptographic control of system configurations
First Claim
1. A method of configuring a system, comprising the steps of:
- authenticating data associated with configuration information;
storing the configuration information; and
configuring the system according to the configuration information.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for using cryptographic techniques to configure data processing systems. A configuration manager cryptographically controls the configuration of a system by ensuring that only authorized users or applications can change the configuration. For example, requests to change configuration information may include authenticated and/or encrypted data. These cryptographic techniques are employed to enable and/or disable functions, features and capabilities of a system. For example, a system may be reconfigured to provide strong or weak encryption based on parameters in the configuration information.
75 Citations
23 Claims
-
1. A method of configuring a system, comprising the steps of:
-
authenticating data associated with configuration information;
storing the configuration information; and
configuring the system according to the configuration information. - View Dependent Claims (2, 3, 4)
-
-
5. A method of configuring a system, comprising the steps of:
-
authenticating configuration information;
storing the authenticated configuration information; and
configuring the system according to the configuration information. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A method of configuring cryptographic capabilities of a system, comprising the steps of:
-
authenticating data associated with export configuration information;
storing the export configuration information; and
configuring the system to employ either a strong encryption or a weak encryption according to the export configuration information. - View Dependent Claims (12, 13, 14)
-
-
15. A method of configuring cryptographic capabilities of a system, comprising the steps of:
-
defining an upgrade utility for generating at least one message comprising export configuration information;
receiving registration information from at least one requester;
sending the registration information to an export compliance authority;
verifying the registration information; and
sending the upgrade utility to the at least one requester.
-
-
16. A method of configuring cryptographic capabilities of a system, comprising the steps of:
-
authenticating data associated with export configuration information;
storing the export configuration information;
configuring the system to employ either a strong encryption or a weak encryption according to the export configuration information.
-
-
17. A method of configuring a system, comprising the steps of:
-
defining at least one cipher key;
encrypting, using the at least one cipher key, data associated with configuration information;
decrypting, using the at least one cipher key, the data associated with configuration information;
storing the configuration information; and
configuring the system according to the configuration information. - View Dependent Claims (18, 19, 20)
-
-
21. A cryptographic accelerator, comprising:
-
at least one data memory for storing at least one cipher key and configuration information;
at least one configuration manager for using the at least one cipher key to control at least one modification of the configuration information; and
at least one cipher engine, connected to receive the configuration information, for encrypting data according to the configuration information. - View Dependent Claims (22, 23)
-
Specification