×

Systems and methods using cryptography to protect secure computing environments

DC
  • US 7,581,092 B2
  • Filed: 08/20/2007
  • Issued: 08/25/2009
  • Est. Priority Date: 08/12/1996
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method performed by an electronic appliance comprising a protected processing environment, the method comprising the steps of:

  • receiving a first digital signature associated with a load module;

    receiving a second digital signature associated with the load module;

    authenticating the first digital signature using a first key; and

    conditionally executing the load module based at least in part on a result of the authenticating step;

    wherein the protected processing environment is resistant to tampering by a user of the electronic appliance with at least the step of authenticating the first digital signature and the step of conditionally executing the load module.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×