SECURE SOFTWARE AND HARDWARE ASSOCIATION TECHNIQUE
First Claim
Patent Images
1. A method of authenticating program code, the method comprising:
- retrieving a public asymmetric encryption key associated with an original equipment manufacturer (OEM) stored in memory;
loading program code from program code memory; and
authenticating the program code by using the public key associated with the OEM.
7 Assignments
0 Petitions
Accused Products
Abstract
In an embodiment, authenticated hardware and authenticated software are cryptographically binded using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. This cryptographic binding technique is referred to herein as secure software and hardware association (SSHA).
-
Citations
66 Claims
-
1. A method of authenticating program code, the method comprising:
-
retrieving a public asymmetric encryption key associated with an original equipment manufacturer (OEM) stored in memory; loading program code from program code memory; and authenticating the program code by using the public key associated with the OEM. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 38)
-
-
28. An apparatus for authenticating program code, the apparatus comprising:
-
memory configured to store a public asymmetric encryption key associated with an original equipment manufacturer (OEM); and a Code Authentication Unit (CAU) configured to retrieve the public key associated with the OEM from the memory, load program code from program code memory, and authenticate the program code by using the public key associated with the OEM. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method of initializing circuitry for authenticating program code, the method comprising:
-
generating a chip identifier (ChipID) associated with a semiconductor product; generating a code encryption key (CEK) associated with the ChipID; and storing a public asymmetric encryption key associated with an original equipment manufacturer (OEM), the ChipID, and the CEK in memory. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A computer readable medium having computer readable program codes embodied therein for authenticating program code, the computer readable medium program codes performing functions comprising:
-
retrieving a public asymmetric encryption key associated with an original equipment manufacturer (OEM) stored in memory; loading program code from program code memory; and authenticating the program code by using the public key associated with the OEM. - View Dependent Claims (66)
-
Specification