Method and system for distributing programs using tamper resistant processor
First Claim
1. A program distribution device for distributing executable programs through a network to a client device having a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance, the program distribution device comprising:
- a first communication path set up unit configured to set up a first communication path between the program distribution device and the client device for communications other than transfer of the executable programs;
a second communication path set up unit configured to set up a second communication path directly connecting the program distribution device and the tamper resistant processor within the client device and dedicated for transfer of the executable programs such that the executable programs are not accessible by any other parts of the client device, the first and second communication paths being set up as different channels on an identical transmission line or as different transmission lines;
an encryption processing unit configured to produce an encrypted program by encrypting an executable program to be distributed to the client device and executed within the tamper resistant processor, by using the unique public key of the tamper resistant processor which is not shared with any other parts of the client device; and
a transmission unit configured to transmit the encrypted program to the tamper resistant processor through the second communication path so that the encrypted program is directly delivered to the tamper resistant processor and the encrypted program can be decrypted and executed only within the tamper resistant processor which is an only entity that has the unique secret key corresponding to the unique public key.
1 Assignment
0 Petitions
Accused Products
Abstract
A scheme for distributing executable programs through a network from a program distribution device to a client device having a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance is disclosed. In this scheme, a first communication path is set up between the program distribution device and the client device, and a second communication path directly connecting the program distribution device and the tamper resistant processor is set up on the first communication path. Then, the encrypted program is transmitted from the program distribution device to the tamper resistant processor through the second communication path.
61 Citations
19 Claims
-
1. A program distribution device for distributing executable programs through a network to a client device having a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance, the program distribution device comprising:
-
a first communication path set up unit configured to set up a first communication path between the program distribution device and the client device for communications other than transfer of the executable programs; a second communication path set up unit configured to set up a second communication path directly connecting the program distribution device and the tamper resistant processor within the client device and dedicated for transfer of the executable programs such that the executable programs are not accessible by any other parts of the client device, the first and second communication paths being set up as different channels on an identical transmission line or as different transmission lines; an encryption processing unit configured to produce an encrypted program by encrypting an executable program to be distributed to the client device and executed within the tamper resistant processor, by using the unique public key of the tamper resistant processor which is not shared with any other parts of the client device; and a transmission unit configured to transmit the encrypted program to the tamper resistant processor through the second communication path so that the encrypted program is directly delivered to the tamper resistant processor and the encrypted program can be decrypted and executed only within the tamper resistant processor which is an only entity that has the unique secret key corresponding to the unique public key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A client device for receiving programs distributed from a program distribution device through a network, the client device comprising:
-
a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance; a first communication path set up unit configured to set up a first communication path between the program distribution device and the client device for communications other than transfer of the executable programs; a second communication path set up unit configured to set up a second communication path directly connecting the program distribution device and the tamper resistant processor within the client device and dedicated for transfer of the executable programs such that the executable programs are not accessible by any other parts of the client device, the first and second communication paths being set up as different transmission lines; and a program receiving unit configured to receive an encrypted program obtained by encrypting an executable program to be distributed to the client device and executed within the tamper resistant processor, by using the unique public key of the tamper resistant processor which is not shared with any other parts of the client device, from the program distribution device through the second communication path, so that the encrypted program is directly delivered to the tamper resistant processor and the encrypted program can be decrypted and executed only within the tamper resistant processor which is an only entity that has the unique secret key corresponding to the unique public key. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A program distribution system, comprising:
-
a program distribution device connected to a network, for distributing executable programs through the network; and a client device connected to the network, for receiving the executable programs distributed from the program distribution device through the network; wherein the client device has; a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance; a client side first communication path set up unit configured to set up a first communication path between the program distribution device and the client device for communications other than transfer of the executable programs; a client side second communication path set up unit configured to set up a second communication path directly connecting the program distribution device and the tamper resistant processor within the client device and dedicated for transfer of the executable programs such that the executable programs are not accessible by any other parts of the client device, the first and second communication paths being set up as different channels on an identical transmission line or as different transmission lines; and a program receiving unit configured to receive an encrypted program from the program distribution device through the second communication path; and
the program distribution device has;a server side first communication path set up unit configured to set up the first communication path between the program distribution device and the client device for communications other than the transfer of the executable programs; a server side second communication path set up unit configured to set up the second communication path directly connecting the program distribution device and the tamper resistant processor within the client device and dedicated for transfer of the executable programs; an encryption processing unit configured to produce the encrypted program by encrypting an executable program to be distributed to the client device and executed within the tamper resistant processor, by using the unique public key of the tamper resistant processor which is not shared with any other parts of the client device; and a transmission unit configured to transmit the encrypted program to the tamper resistant processor through the second communication path so that the encrypted program is directly delivered to the tamper resistant processor and the encrypted program can be decrypted and executed within the tamper resistant processor which is an only entity that has the unique secret key corresponding to the unique public key.
-
-
14. A method for distributing executable programs through a network from a program distribution device to a client device having a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance, the method comprising the steps of:
-
setting up a first communication path between the program distribution device and the client device for communications other than transfer of the executable programs; setting up a second communication path directly connecting the program distribution device and the tamper resistant processor within the client device and dedicated for transfer of the executable programs such that the executable programs are not accessible by any other parts of the client device, the first and second communication paths being set up as different channels on an identical transmission line or as different transmission lines; producing an encrypted program by encrypting an executable program to be distributed to the client device and executed within the tamper resistant processor, by using the unique public key of the tamper resistant processor which is not shared with any other parts of the client device, at the program distribution device; and transmitting the encrypted program from the program distribution device to the tamper resistant processor through the second communication path so that the encrypted program is directly delivered to the tamper resistant processor and the encrypted program can be decrypted and executed only within the tamper resistant processor which is an only entity that has the unique secret key corresponding to the unique public key. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification