INTEGRATED CIRCUIT WITH SECURED SOFTWARE IMAGE AND METHOD THEREFOR
First Claim
1. A method comprising:
- encrypting a code image, from an external device, by a cryptographic logic using a hardware unique key to create a hardware unique code image, said hardware unique key being inaccessible to said external device; and
storing said hardware unique code image wherein said hardware unique code image is executable only after decrypting said hardware unique code image using said hardware unique key.
1 Assignment
0 Petitions
Accused Products
Abstract
The various embodiments herein disclosed include a method wherein an integrated circuit (100) may receive a code image from an external device (127), encrypt the code image using a cryptographic logic (113) with a Hardware Unique Key to create a Hardware Unique Code Image (119) where the Hardware Unique Key is inaccessible to the external device (127). The integrated circuit (100) will then store the Hardware Unique Code Image wherein the Hardware Unique Code Image is executable only after decryption using the Hardware Unique Key. The method also includes sending a command to a cryptographic logic (113) to request decryption of the Hardware Unique Code Image by the cryptographic logic (113) using the Hardware Unique Key and executing the Hardware Unique Code Image by the boot software (103) after the decryption.
-
Citations
20 Claims
-
1. A method comprising:
-
encrypting a code image, from an external device, by a cryptographic logic using a hardware unique key to create a hardware unique code image, said hardware unique key being inaccessible to said external device; and storing said hardware unique code image wherein said hardware unique code image is executable only after decrypting said hardware unique code image using said hardware unique key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An integrated circuit comprising:
-
a memory; and a cryptographic logic coupled to said memory, said cryptographic logic operative to; encrypt a code image using a hardware unique key to create a hardware unique code image, said hardware unique key being inaccessible via any port of said integrated circuit; and store said hardware unique code image in said memory wherein said hardware unique code image is executable only after decrypting said hardware unique code image using said hardware unique key. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An integrated circuit comprising:
-
a peripheral controller, operative to control an external device to receive said code image therefrom; a memory; a hardware unique key logic; a cryptographic logic operatively coupled to said memory and to said hardware unique key logic, said cryptographic logic operative to; send a request to said hardware unique key logic for said hardware unique key; receive said hardware unique key from said hardware unique key logic in response to said request; encrypt said code image using said hardware unique key to create a hardware unique code image, said hardware unique key being inaccessible via any port of said integrated circuit; and store said hardware unique code image in said memory wherein said hardware unique code image is executable only after decrypting said hardware unique code image using said hardware unique key; a memory controller, operatively coupled to said cryptographic logic; and a boot ROM, operatively coupled to said memory controller;
said boot ROM operative to;send a request to said cryptographic logic to request decryption of said hardware unique code image by said cryptographic logic using said hardware unique key; and execute said hardware unique code image after said decryption. - View Dependent Claims (19, 20)
-
Specification