Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
First Claim
1. A method of initializing secure operation of an integrated system, said method comprising:
- generating at least one key for the integrated system;
loading initial code into the integrated system, the loading including using the at least one key to encrypt the initial code via a data access control function of the integrated system; and
reinitializing the integrated system using the encrypted initial code.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for initializing, maintaining, updating and recovering secure operation within an integrated system. The techniques, which employ a data access control function within the integrated system, include authenticating by a current level of software a next level of software within an integrated system. The authenticating occurs before control is passed to the next level of software. Further, an ability of the next level of software to modify an operational characteristic of the integrated system can be selectively limited via the data access control function. Techniques are also provided for initializing secure operation of the integrated system, for migrating data encrypted using a first key set to data encrypted using a second key set, for updating software and keys within the integrated system, and for recovering integrated system functionality following a trigger event.
85 Citations
28 Claims
-
1. A method of initializing secure operation of an integrated system, said method comprising:
-
generating at least one key for the integrated system;
loading initial code into the integrated system, the loading including using the at least one key to encrypt the initial code via a data access control function of the integrated system; and
reinitializing the integrated system using the encrypted initial code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of recovering integrated system functionality following a trigger event, said method comprising:
-
automatically establishing a reduced level of functionality within the integrated system; and
allowing for full functional recovery of the integrated system by employing a selective recovery procedure. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system of initializing secure operation of an integrated system, said system comprising:
-
means for generating at least one key for the integrated system;
means for loading initial code into the integrated system, the loading including using the at least one key to encrypt the initial code via a data access control function of the integrated system; and
means for reinitializing the integrated system using the encrypted initial code. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system of recovering integrated system functionality following a trigger event, said system comprising:
-
means for automatically establishing a reduced level of functionality within the integrated system; and
means for allowing for full functional recovery of the integrated system by employing a selective recovery procedure. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
-
27. At least one program storage device readable by a machine embodying at least one program of instructions executable by the machine to perform a method of initializing secure operation of an integrated system, said method comprising:
-
generating at least one key for the integrated system;
loading initial code into the integrated system, the loading including using the at least one key to encrypt the initial code via a data access control function of the integrated system; and
reinitializing the integrated system using the encrypted initial code.
-
-
28. At least one program storage device readable by a machine embodying at least one program of instructions executable by the machine to perform a method of recovering integrated system functionality following a trigger event, said method comprising:
-
automatically establishing a reduced level of functionality within the integrated system; and
allowing for full functional recovery of the integrated system by employing a selective recovery procedure.
-
Specification