System and method for cryptographic control of system configurations
First Claim
Patent Images
1. A method of configuring a system, comprising the steps of:
- authenticating configuration information comprising one or more indications denoting export or domestic key encryption;
storing the configuration information; and
configuring the security of the system according to the configuration information, by designating one of at least two available modes of encryption, the modes comprising strong encryption and weak encryption,wherein the ability to configure the security of the system according to the configuration information comprises the ability to (a) modify a processing power of the system by enabling or disabling one or more parallel computational components in response to the configuration information and (b) adjust a clock speed in response to the configuration information.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for using cryptographic techniques to configure data processing systems. A configuration manager cryptographically controls the configuration of a system by ensuring that only authorized users or applications can change the configuration. For example, requests to change configuration information may include authenticated and/or encrypted data. These cryptographic techniques are employed to enable and/or disable functions, features and capabilities of a system. For example, a system may be reconfigured to provide strong or weak encryption based on parameters in the configuration information.
33 Citations
13 Claims
-
1. A method of configuring a system, comprising the steps of:
-
authenticating configuration information comprising one or more indications denoting export or domestic key encryption; storing the configuration information; and configuring the security of the system according to the configuration information, by designating one of at least two available modes of encryption, the modes comprising strong encryption and weak encryption, wherein the ability to configure the security of the system according to the configuration information comprises the ability to (a) modify a processing power of the system by enabling or disabling one or more parallel computational components in response to the configuration information and (b) adjust a clock speed in response to the configuration information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of configuring a system, comprising the steps of:
-
defining at least one cipher key; encrypting, using the at least one cipher key, data associated with configuration information; decrypting, using the at least one cipher key, the data associated with configuration information comprising one or more indications denoting export or domestic key encryption; storing the configuration information; and configuring the security of the system according to the configuration information, by designating one of at least two available modes of encryption, the modes comprising strong encryption and weak encryption, wherein the ability to configure the security of the system according to the configuration information comprises the ability to (a) modify a processing power of the system by enabling ot disabling one or more parallel computational components in response to the configuration information and (b) adjust a clock speed in response to the configuration information. - View Dependent Claims (11, 12, 13)
-
Specification