×

Control function implementing selective transparent data authentication within an integrated system

  • US 7,266,842 B2
  • Filed: 04/18/2002
  • Issued: 09/04/2007
  • Est. Priority Date: 04/18/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A data authentication method for an integrated device having multiple functional masters, the multiple functional masters having multiple master ids, said method comprising:

  • defining different levels of data access security to the multiple functional masters, where the different levels of data access security are predefined in an access table, the access table enforcing the defined access rights for the multiple functional masters to ensure security within the integrated device;

    passing a data request, comprising an address associated with requested data, from a functional master through a data access control function disposed within a data path between a bus controller and a slave device coupled to memory, the data access control function residing within a secure memory subsystem of the integrated device;

    responsive to the data request, selectively authenticating the requested data by the data access control function transparent to the functional master of the integrated device initiating the data request, the selectively authenticating comprising selectively verifying integrity of the requested data by the data access control function within the secure memory subsystem based on a master ID of the requesting master, the data access level for the requesting master defined in the access table and the address of the requested data, the verifying integrity employing an encrypted integrity check value comprising an encrypted digest of the requested data, the encrypted digest being an encrypted reduced version of the requested data;

    when authenticating the requested data, deciding by the data access control function, with reference to the data access level of the requesting master, whether to decrypt the data when the request is a read request, and whether to encrypt the data when the request is a write request; and

    wherein the verifying integrity employs a common encryption/decryption engine of the data access control function when encrypting/decrypting integrity check values as used for encrypting/decrypting the requested data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×