SYSTEM AND METHOD FOR GENERATING SECURED AUTHENTICATION IMAGE FILES FOR USE IN DEVICE AUTHENTICATION
First Claim
1. A method for generating a secure authentication image file, comprising:
- reserving a plurality of key address locations in a raw memory image file;
receiving the raw memory image file and the key address location in a key merger application;
receiving a secure key data in the key merger application;
merging the secure key data into the raw memory image file to generate the secure authentication image file; and
erasing the secure key data and the raw memory image file.
5 Assignments
0 Petitions
Accused Products
Abstract
A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure authentication image file and a received plaintext challenge, and outputs a cyphertext response. If the cyphertext response matches a pre-stored cyphertext string associated with the plaintext challenge, then the device is authenticated. The secure authentication image file is pre-generated in a secure environment. A plurality of key address locations are reserved in a raw memory image file. A key merger application merges the secure key data into the raw memory image file to generate a secure authentication image file. A test set of plaintext/cyphertext pairs are generated using the newly created secure authentication image file. To maintain security of the secure authentication image file, the secure key data and the raw memory image file are erased from a working memory. The test set of plaintext/cyphertext pairs are used to verify a production device containing the secure authentication image file.
49 Citations
19 Claims
-
1. A method for generating a secure authentication image file, comprising:
-
reserving a plurality of key address locations in a raw memory image file; receiving the raw memory image file and the key address location in a key merger application; receiving a secure key data in the key merger application; merging the secure key data into the raw memory image file to generate the secure authentication image file; and erasing the secure key data and the raw memory image file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for generating a secure authentication image file, comprising:
-
a memory for storing a raw memory image file and a secure authentication image file; a user input for receiving a secure key data; a processor coupled to the user input and to the memory, the processor comprising; a key merger application for reserving a plurality of key address locations in the raw memory image file, and for merging the secure key data into the raw memory image file to generate the secure authentication image file, and for erasing the secure key data and the raw memory image file after completion of the generation of the secure authentication image file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for generating a secure authentication image file, comprising:
-
identifying a plurality of key address locations distributed in a plurality of non-adjacent random memory locations in a raw memory image file; receiving the raw memory image file and the plurality of key address locations in a key merger application; receiving a secure key data in the key merger application; and inserting the secure key data into the plurality of key address locations of the raw memory image file to generate a secure authentication image file.
-
Specification