PROCESSING SYSTEM WITH APPLICATION SECURITY AND METHODS FOR USE THEREWITH
First Claim
Patent Images
1. A processing system comprising:
- an interface for receiving application data at the processing system corresponding to an application, the application data including authentication data;
a one-time programmable memory that stores at least one application key;
a processing module, coupled to the interface and the one-time programmable memory, that executes an operating system that includes a security routine to authenticate the application data based on the authentication data and the at least one application key, wherein the security routine permits the execution of the application by the processing module when the authentication data is authenticated, and that prevents the execution of the application by the processing system when the authentication data is not authenticated.
0 Assignments
0 Petitions
Accused Products
Abstract
A processing system includes an interface for receiving application data at the processing system corresponding to an application, the application data including authentication data. A one-time programmable memory stores at least one application key. A processing module executes an operating system that includes a security routine to authenticate the application data based on the authentication data and the at least one application key. The security routine permits the execution of the application by the processing module when the authentication data is authenticated, and prevents the execution of the application by the processing system when the authentication data is not authenticated.
-
Citations
15 Claims
-
1. A processing system comprising:
-
an interface for receiving application data at the processing system corresponding to an application, the application data including authentication data; a one-time programmable memory that stores at least one application key; a processing module, coupled to the interface and the one-time programmable memory, that executes an operating system that includes a security routine to authenticate the application data based on the authentication data and the at least one application key, wherein the security routine permits the execution of the application by the processing module when the authentication data is authenticated, and that prevents the execution of the application by the processing system when the authentication data is not authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for use in an operating system executed by a processing system, the method comprising:
-
receiving application data at the processing system corresponding to an application, the application data including authentication data; retrieving at least one application key from a one-time programmable memory of the processing system; executing a security routine to authenticate the application data based on the authentication data and the at least one application key; executing the application by the processing system when the authentication data is authenticated; and preventing the execution of the application by the processing system when the authentication data is not authenticated. - View Dependent Claims (11)
-
-
13. A method for use in manufacturing a processing system, the method comprising:
-
storing an operating system in a memory of the processing system; and storing at least one application key in a one-time programmable memory of the processing system, the application key for use in by the operating system for authenticating at least one application received by the processing system prior to execution by the processing system. - View Dependent Claims (12, 14, 15)
-
Specification