Configurable Signature for Authenticating Data or Program Code
First Claim
1. A method, comprising:
- retrieving configuration information from a protected first memory, wherein the configuration information specifies a plurality of non-contiguous memory locations that store a signature;
retrieving the signature from the plurality of non-contiguous memory locations of the signature based on the configuration information;
wherein the signature is useable to verify security for a system.
10 Assignments
0 Petitions
Accused Products
Abstract
System and method for authenticating data or program code via a configurable signature. Configuration information is retrieved from a protected first memory, e.g., an on-chip register, where the configuration information specifies a plurality of non-contiguous memory locations that store the signature, e.g., in an on-chip memory trailer. The signature is retrieved from the plurality of non-contiguous memory locations based on the configuration information, where the signature is useable to verify security for a system. The signature corresponds to specified data and/or program code stored in a second memory, e.g., in off-chip ROM. The specified data and/or program code may be copied from the second memory to a third memory, and a signature for the specified data and/or program code calculated based on the configuration information. The calculated signature may be compared with the retrieved signature to verify the specified data and/or program code.
82 Citations
20 Claims
-
1. A method, comprising:
-
retrieving configuration information from a protected first memory, wherein the configuration information specifies a plurality of non-contiguous memory locations that store a signature; retrieving the signature from the plurality of non-contiguous memory locations of the signature based on the configuration information; wherein the signature is useable to verify security for a system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for authenticating data or program code, comprising:
-
an embedded processor; and a protected first memory coupled to the embedded processor, wherein the protected first memory stores configuration information specifying a plurality of non-contiguous memory locations that store a signature; wherein the embedded processor is operable to retrieve the signature from the plurality of non-contiguous memory locations of the signature based on the configuration information, wherein the signature is useable to verify security for a system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification