TAMPER RESISTANT METHOD AND APPARATUS FOR A STORAGE DEVICE
First Claim
Patent Images
1. A method for authenticating software for use in a device comprising:
- encrypting software to be input to a disk drive with a private key; and
decrypting the software at the device with a public key retrieved from a memory of in communication with the device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating software for use in a device includes encrypting software to be input to a device with a private key, and decrypting the software presented to the device with a public key retrieved from a memory accessible by the device.
-
Citations
22 Claims
-
1. A method for authenticating software for use in a device comprising:
-
encrypting software to be input to a disk drive with a private key; and decrypting the software at the device with a public key retrieved from a memory of in communication with the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining a hash code on firmware used to operate a device; encrypting the determined hash code using a private key; storing a public key in a memory accessible to the device; and before execution of firmware presented to a device, determining the hash code on the firmware presented to the device; and decrypting the previously encrypted hash code of the firmware; and comparing the decrypted hash code to the hash code of the firmware presented for execution on the device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An integrated circuit comprising:
-
a processor; a read only memory communicatively coupled to the processor; a visibility port associated with the integrated circuit capable of providing information about the processor and the read only memory to the port, wherein the read only memory includes at least a portion of cryptographic information; and a visibility port disabler that masks visibility port during cryptographic operations of the processor. - View Dependent Claims (18)
-
-
19. A machine-readable medium that provides instructions that, when executed by a machine, cause the machine to:
-
determine that software code has been presented to an input port; and enable an authentication routine to authenticate the software code. - View Dependent Claims (20, 21, 22)
-
Specification