×

System and method for authenticating software using hidden intermediate keys

  • US 6,961,852 B2
  • Filed: 06/19/2003
  • Issued: 11/01/2005
  • Est. Priority Date: 06/19/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method for authenticating software, said method comprising:

  • authenticating a first computer file stored on a nonvolatile storage area accessible by a computer system, the authenticating of the first computer file performed by hashing the first software program using a master key value that is located in a nonvolatile memory of the computer system inaccessible to a user;

    generating one or more intermediate key values during the hashing of the first software program;

    storing the intermediate key values in a memory of the computer system inaccessible to the user; and

    authenticating a second computer file stored on the nonvolatile storage area, the authenticating of the second computer file performed by hashing the second computer file using one or more of the intermediate key values.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×