×

Secure distribution of portable game software

  • US 7,278,031 B1
  • Filed: 04/30/2003
  • Issued: 10/02/2007
  • Est. Priority Date: 05/10/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of securely distributing computer executable instructions to multiple computers, comprising the steps of:

  • (a) storing substantially unique identifying data in a secure single-chip cryptoprocessor that contains a processor core, writable data storage, decryption circuitry, and internal buses that are all inaccessible from said cryptoprocessor from locations outside of said cryptoprocessor chip, wherein said identifying data distinguishes different cryptoprocessor units;

    (b) transmitting said identifying data to a network server to enable download from said server of first and second programs of executable instructions, wherein said first program is encrypted in said server as a function of a randomly generated encryption key and said identifying data, such that said first program in encrypted form is downloaded to a first computer system that contains said cryptoprocessor during use, and wherein said second program is downloaded to said first computer system in unencrypted form;

    (c) decrypting said downloaded first program in said cryptoprocessor as a function of said identifying data and a decryption key to produce executable decrypted instructions in said writable data storage in said cryptoprocessor, wherein said decrypted instructions are inhibited from being output from said cryptoprocessor;

    (d) executing said decrypted instructions of said first program in said processor core in said cryptoprocessor to generate first output data; and

    (e) executing instructions of said second program in a second processor chip to process said first output data from said cryptoprocessor and to generate second output data that is processed as input data by said cryptoprocessor, such that said first program can be fully executed in said cryptoprocessor only by processing data in said cryptoprocessor that is generated by said second program and said second program can be fully executed only by processing data generated by said first program.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×