Systems and methods using cryptography to protect secure computing environments
DC CAFCFirst Claim
1. A security method comprising:
- (a) digitally signing a first load module with a first digital signature designating the first load module for use by a first device class;
(b) digitally signing a second load module with a second digital signature different from the first digital signature, the second digital signature designating the second load module for use by a second device class having at least one of tamper resistance and security level different from the at least one of tamper resistance and security level of the first device class;
(c) distributing the first load module for use by at least one device in the first device class; and
(d) distributing the second load module for use by at least one device in the second device class.
3 Assignments
Litigations
1 Petition
Accused Products
Abstract
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority--which may be a trusted independent third party--tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)--allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.
916 Citations
41 Claims
-
1. A security method comprising:
-
(a) digitally signing a first load module with a first digital signature designating the first load module for use by a first device class; (b) digitally signing a second load module with a second digital signature different from the first digital signature, the second digital signature designating the second load module for use by a second device class having at least one of tamper resistance and security level different from the at least one of tamper resistance and security level of the first device class; (c) distributing the first load module for use by at least one device in the first device class; and (d) distributing the second load module for use by at least one device in the second device class. - View Dependent Claims (2, 3, 4)
-
-
5. A software verifying method comprising:
-
(a) testing a load module having at least one specification associated therewith, the specification describing one or more functions performed by the load module; (b) verifying that the load module satisfies the specification; and (c) issuing at least one digital certificate attesting to the results of the verifying step.
-
-
6. A method of authenticating a load module comprising:
-
(a) authenticating a first digital signature associated with some or all of the load module, including the step of employing a first one-way hash algorithm, a first decryption algorithm, and a first public key key, the first public key secured behind a tamper resistant barrier and therefore hidden from the user; and (b) authenticating a second digital signature associated with the same portion of the load module as the first digital signature is associated with, including the step of employing at least one of; (i) a second one-way hash algorithm that is different from the first one-way hash algorithm, (ii) a second decryption algorithm that is different from the first decryption algorithm, and (iii) a second public key that is different from the first public key. - View Dependent Claims (7, 8)
-
-
9. A method of distinguishing between trusted and untrusted load modules comprising:
-
(a) receiving a load module, (b) determining whether the load module has an associated digital signature, (c) if the load module has an associated digital signature, authenticating the digital signature using at least one public key secured behind a tamper resistant barrier and therefore hidden from the user; and (d) conditionally executing the load module based at least in part on the results of authenticating step (c).
-
-
10. A method of increasing the security of a virtual distribution environment comprising plural interoperable protected processing environments having different security levels, the method comprising:
-
(a) classifying the plural protected processing environments based on security level, (b) distributing different verification public keys to different protected processing environments having different security level classifications, and (c) using the distributed verification public keys to authenticate load modules, including the step of preventing protected processing environments having different security level classifications from executing the same load module. - View Dependent Claims (11, 12, 13)
-
-
14. A first protected processing environment comprising:
-
a first tamper resistant barrier having a first security level, and at least one arrangement within the first tamper resistant barrier that prevents the first protected processing environment from executing the same load module accessed by a second protected processing environment having a second tamper resistant barrier with a second security level different from the first security level. - View Dependent Claims (15, 16, 17)
-
-
18. A method for protecting a first computing arrangement surrounded by a first tamper resistant barrier having a first security level, the method including:
preventing the first computing arrangement from using the same software module accessible by a second computing arrangement having a second tamper resistant barrier with a second security level different from the first security level.
-
19. A method as in claim 19 wherein the preventing step comprises:
authenticating at least one digital signature associated with the first computing arrangement as corresponding to the first security level.
-
20. A method of protecting computing arrangements comprising:
-
(a) associating plural digital signatures with a load module; (b) authenticating a first subset of the plural digital signatures with a first tamper resistant computing arrangement; and (c) authenticating a second subset of the plural digital signatures with a second tamper resistant computing arrangement different from the first computing arrangement.
-
-
21. A computer security method comprising:
-
digitally signing, using a first digital signing technique, a first executable designating the first executable for use by a first device class; and digitally signing, using a second digital signing technique different from the first digital signing technique, a second executable designating the second executable for use by a second device class having at least one of tamper resistance and security level different from the at least one tamper resistance and security level of the first device class. - View Dependent Claims (22, 23, 24)
-
-
25. A software verifying method comprising:
-
testing an executable having at least one specification associated therewith, the specification describing one or more functions of the load module; verifying that the executable satisfies the specification; and issuing at least one digital certificate attesting to the results of the verifying step.
-
-
26. A method of authenticating an executable comprising:
-
(a) authenticating a first digital signature associated with some or all of the executable, including the step of employing a first one-way hash algorithm, a first decryption algorithm, and a first public key, the first public key secured behind a tamper resistant barrier and therefore hidden from the user; and (b) authenticating a second digital signature associated with the same portion of the executable as the first digital signature is associated with, including the step of employing at least one of; (i) a second one-way hash algorithm that is different from the first one-way hash algorithm, (ii) a second decryption algorithm that is different from the first decryption algorithm, and (iii) a second public key that is different from the first public key. - View Dependent Claims (27, 28)
-
-
29. A method of distinguishing between trusted and untrusted executables comprising:
-
(a) receiving a executable, (b) determining whether the executable has an associated digital signature, (c) if the executable has an associated digital signature, authenticating the digital signature using at least one public key secured behind a tamper resistant barrier and therefore hidden from the user; and (d) conditionally executing the executable based at least in part on the results of authenticating step (c).
-
-
30. A method of increasing the security of plural interoperable secure execution spaces having different security levels, the method comprising:
-
(a) classifying the plural secure execution spaces based on security level, (b) distributing different verification public keys to different secure execution spaces having different security level classifications, and (c) using the distributed verification public keys to authenticate executables, including the step of preventing secure execution spaces having different security level classifications from executing the same executable. - View Dependent Claims (31, 32, 33)
-
-
34. A protected processing environment comprising:
-
a first tamper resistant barrier having a first security level, a first secure execution space, and at least one arrangement within the first tamper resistant barrier that prevents the first secure execution space from executing the same executable accessed by a second secure execution space having a second tamper resistant barrier with a second security level different from the first security level. - View Dependent Claims (35, 36, 37)
-
-
38. A method for protecting a first computing arrangement surrounded by a first tamper resistant barrier having a first security level, the method including:
preventing the first computing arrangement from using the same software module accessed by a second computing arrangement having a second tamper resistant barrier with a second security level different from the first security level. - View Dependent Claims (39)
-
40. A method of protecting computing arrangements comprising:
-
(a) associating plural digital signatures with an executable; (b) authenticating a first subset of the plural digital signatures with a first tamper resistant computing arrangement; and (c) authenticating a second subset of the plural digital signatures with a second tamper resistant computing arrangement different from the first environment. - View Dependent Claims (41)
-
Specification