Apparatus and method of reading a program into a processor
First Claim
Patent Images
1. A method comprising the steps of:
- entering a bootstrap mode of a processor;
during the bootstrap mode;
reading, into a memory within the processor, a bootstrap program from a device external to the processor;
decrypting the bootstrap program using a key embedded inside the processor, yielding a decrypted program;
performing authentication verification on the decrypted program;
executing, by the processor, the decrypted program only after the decrypted program is authenticated, and when the decrypted program fails to be authenticated, inhibiting execution of the decrypted program by the processor.
2 Assignments
0 Petitions
Accused Products
Abstract
The following describes an apparatus for and method of providing a secure method of downloading a program into a processor (101) from a device (103) external to the processor (101). The program may be encrypted (207) prior to its entry into the external device (103). The program may also have authentication information added (203 and 207) to it. Authentication information may be provided on an unencrypted and/or an encrypted program. The processor (101) decrypts (307) and/or successfully authenticates (311) the program before allowing the program to be executed by the processor (101).
-
Citations
26 Claims
-
1. A method comprising the steps of:
-
entering a bootstrap mode of a processor; during the bootstrap mode; reading, into a memory within the processor, a bootstrap program from a device external to the processor; decrypting the bootstrap program using a key embedded inside the processor, yielding a decrypted program; performing authentication verification on the decrypted program; executing, by the processor, the decrypted program only after the decrypted program is authenticated, and when the decrypted program fails to be authenticated, inhibiting execution of the decrypted program by the processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A processor comprising:
-
a first memory, arranged and constructed to obtain a bootstrap program from a device external to the processor during a bootstrap mode; a decryption processor, operably coupled to the first memory, arranged and constructed to decrypt the bootstrap program utilizing a key stored within the processor during the bootstrap mode; a second memory arranged and constructed to store, during the bootstrap mode, the decrypted program for subsequent execution by the processor; wherein the processor is arranged and constructed to performing authentication verification on the decrypted program and execute the decrypted program only after successful authentication of the decrypted program as an intended program. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A method comprising the steps of:
-
entering a bootstrap mode of a processor; during the bootstrap mode; reading, by a first memory within the processor, a bootstrap program stored as an encrypted bootstrap program in a device external to the processor; decrypting the bootstrap program, yielding a decrypted program; performing authentication verification on the decrypted program; when the program is authenticated, executing, by the processor, the decrypted program; when the decrypted program fails to be authenticated, inhibiting execution of the decrypted program by the processor. - View Dependent Claims (24, 25, 26)
-
Specification