×

Systems and methods for using cryptography to protect secure and insecure computing environments

  • US 7,689,827 B2
  • Filed: 05/22/2007
  • Issued: 03/30/2010
  • Est. Priority Date: 07/29/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. In an electronic appliance including a secure execution space and an insecure execution space, a method for permitting an application executing within the insecure execution space to request one or more services from a trusted element executing in the secure execution space, the method comprising:

  • (a) issuing a challenge from the trusted element to the application executing within the insecure execution space, the challenge being based at least in part on randomly selected parts of an authenticated credential, the challenge requesting the application to provide one or more cryptographic hashes of one or more portions of the application, the one or more portions of the application including at least some executable software code;

    (b) sending, from the application to the trusted element, said one or more cryptographic hashes of one or more portions of the application;

    (c) comparing, at the trusted element, information provided by the authenticated credential with said one or more cryptographic hashes of one or more portions of the application; and

    (d) denying the application access to said one or more services if the comparison fails.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×