SECURE PROCESSOR AND A PROGRAM FOR A SECURE PROCESSOR
First Claim
Patent Images
1. A processor comprising:
- a key memory unit configured to store a key;
an instruction code memory unit configured to store a first program in a non-rewritable format;
an authentication unit configured to authenticate the first program by using the key and an electronic signature corresponding to the first program;
a secure core configured to execute the first program which is authenticated by the authentication unit; and
a normal core configured to execute a second program which is not authenticated by the authentication unit,wherein the normal core is booted in response to the execution of the first program by the secure core.
1 Assignment
0 Petitions
Accused Products
Abstract
The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside.
12 Citations
34 Claims
-
1. A processor comprising:
-
a key memory unit configured to store a key; an instruction code memory unit configured to store a first program in a non-rewritable format; an authentication unit configured to authenticate the first program by using the key and an electronic signature corresponding to the first program; a secure core configured to execute the first program which is authenticated by the authentication unit; and a normal core configured to execute a second program which is not authenticated by the authentication unit, wherein the normal core is booted in response to the execution of the first program by the secure core. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A processor comprising:
-
a key memory unit configured to store a key; an instruction code memory unit configured to store a first program in a non-rewritable format; an authentication unit configured to authenticate a second program by an execution of the first program by using the key and an electronic signature corresponding to the second program; a secure core configured to execute the second program which is authenticated by the authentication unit; and a normal core configured to execute a third program which is not authenticated by the authentication unit, wherein the normal core is booted in response to the execution of the second program by the secure core. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
Specification