×

SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA

  • US 20160292458A1
  • Filed: 06/21/2016
  • Published: 10/06/2016
  • Est. Priority Date: 12/14/1999
  • Status: Active Grant
First Claim
Patent Images

1. A system for securely evaluating authenticity of software, comprising:

  • a protected processing environment comprising;

    a processor,non-volatile memory,volatile memory,a tamper-resistant barrier, anda root verification key stored in a manner that is resistant to tampering;

    a storage medium storing a data block, said data block at least in part including executable instructions;

    a storage location storing a signed root check value and two or more check values, said signed root check value and two or more check values being in a hierarchy of check values, each of said check values having been derived at least in part from a sub-block of said data block or from a plurality of check values in the hierarchy of check values;

    input verification logic, said input verification logic protected against tampering, said input verification logic operable to;

    authenticate said signed root check value at least in part using said root verification key,verify the integrity of said two or more check values at least in part using the authenticated root check value or a verified check value in the hierarchy of check values,verify the integrity of a sub-block of said data block using at least one of said verified check values, andrelease said sub-block of said data block for execution based at least in part on the result of said authentication and verification steps; and

    one or more storage locations configured to store said authenticated root check value and said two or more verified check values in a manner that is resistant to tampering.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×