×

Secure execution of downloaded software

  • US 7,350,081 B1
  • Filed: 10/06/2003
  • Issued: 03/25/2008
  • Est. Priority Date: 04/29/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of securely distributing program instructions for execution in a single-chip secure cryptoprocessor that contains chip identifier data that distinguishes different cryptoprocessor units, encryption circuitry for encrypting said identifier, decryption circuitry for decrypting encrypted digital program instructions, writable program memory for storing decrypted instructions, and processor core for executing said decrypted instructions which are inaccessible from said secure cryptoprocessor chip from locations outside of said chip after fabrication of said chip is completed;

  • the method comprising;

    (a) encrypting in a network server a first program of executable digital instructions under control of a first encryption key;

    (b) transmitting said encrypted first program of digital instructions from said server to said cryptoprocessor;

    (c) encrypting said chip identifier in said cryptoprocessor chip to produce an encrypted identifier;

    (d) transmitting said encrypted identifier to said server;

    (e) reencrypting in said server said chip identifier together with a decryption key corresponding to said first encryption key to produce at least one encrypted data block such that each bit in said encrypted data block is a complex function of every bit in said decryption key and every bit in said chip identifier;

    (f) transmitting said data block to said cryptoprocessor chip;

    (g) decrypting said encrypted data block in said cryptoprocessor chip to produce a decrypted identifier and said decryption key in said cryptoprocessor chip;

    (h) decrypting said encrypted first program in said cryptoprocessor chip under control of said decryption key to produce executable digital instructions stored in said program memory; and

    (i) executing said digital instructions in said processor core in said cryptoprocessor chip to generate output data if said decrypted identifier has a predetermined relationship with said chip identifier in said cryptoprocessor chip.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×