Systems and methods for using cryptography to protect secure and insecure computing environments
First Claim
1. In an electronic appliance including a secure execution space and an insecure execution space, a method for permitting an application executing within the insecure execution space to request one or more services from a trusted element executing in the secure execution space, the method comprising:
- (a) issuing a challenge from the trusted element to the application executing within the insecure execution space, the challenge being based at least in part on randomly selected parts of an authenticated credential, the challenge requesting the application to provide one or more cryptographic hashes of one or more portions of the application, the one or more portions of the application including at least some executable software code;
(b) sending, from the application to the trusted element, said one or more cryptographic hashes of one or more portions of the application;
(c) comparing, at the trusted element, information provided by the authenticated credential with said one or more cryptographic hashes of one or more portions of the application; and
(d) denying the application access to said one or more services if the comparison fails.
2 Assignments
0 Petitions
Accused Products
Abstract
Computation environments are protected from bogus or rogue load modules, executables, and other data elements through use of digital signatures, seals, and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules and/or other items to verify that their corresponding specifications are accurate and complete, and then digitally signs them based on a tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys), allowing one tamper resistance work factor environment to protect itself against load modules from another tamper resistance work factor environment. The verifying authority can provide an application intended for insecure environments with a credential having multiple elements covering different parts of the application. To verify the application, a trusted element can issue challenges based on different parts of the authenticated credential that the trusted element selects in an unpredictable (e.g., random) way, and deny service (or take other appropriate action) if the responses do not match the authenticated credential.
58 Citations
21 Claims
-
1. In an electronic appliance including a secure execution space and an insecure execution space, a method for permitting an application executing within the insecure execution space to request one or more services from a trusted element executing in the secure execution space, the method comprising:
-
(a) issuing a challenge from the trusted element to the application executing within the insecure execution space, the challenge being based at least in part on randomly selected parts of an authenticated credential, the challenge requesting the application to provide one or more cryptographic hashes of one or more portions of the application, the one or more portions of the application including at least some executable software code; (b) sending, from the application to the trusted element, said one or more cryptographic hashes of one or more portions of the application; (c) comparing, at the trusted element, information provided by the authenticated credential with said one or more cryptographic hashes of one or more portions of the application; and (d) denying the application access to said one or more services if the comparison fails. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer readable storage medium storing a computer program, the computer program including instructions that, when executed by a processor of an electronic appliance, are operable to cause the electronic appliance to take actions comprising:
-
(a) issuing a challenge from a trusted element executing in a secure execution space to an application executing in an insecure execution space, the challenge being based at least in part on randomly selected parts of an authenticated credential, the challenge requesting the application to provide one or more cryptographic hashes of one or more portions of the application, the one or more portions of the application including at least some executable software code; (b) receiving, from the application, said one or more cryptographic hashes of one or more portions of the application; (c) comparing information provided by the authenticated credential with said one or more cryptographic hashes of one or more portions of the application; and (d) denying the application access to one or more services provided by an application executing in the secure execution space if the comparison fails. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An electronic appliance comprising:
-
an insecure execution space; and a protected processing environment comprising a processor having a secure execution space including a trusted element, the trusted element configured to; (a) issue a challenge to an application executing in the insecure execution space, the challenge being based at least in part on randomly selected parts of an authenticated credential, the challenge requesting the application to provide one or more cryptographic hashes of one or more portions of the application, the one or more portions of the application including at least some executable software code; (b) receive, from the application, said one or more cryptographic hashes of one or more portions of the application; (c) compare information provided by the authenticated credential with said one or more cryptographic hashes of one or more portions of the application; and (d) deny the application access to one or more services provided by an application executing in the secure execution space if the comparison fails. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. In an electronic appliance including a secure execution space and an insecure execution space, a method for using a trusted element executing in the secure execution space comprising:
-
validating at least one digital signature corresponding to a credential; selecting, based at least in part on the credential, at least one predetermined portion of an application executing in the insecure execution space, the predetermined portion of the application including at least some executable software code, and issuing a challenge requesting a response from the application, the response providing a computation of at least one cryptographic hash of the selected predetermined portion of the application, wherein the predetermined portion of the application has been selected to provide sufficient coverage of a particular component of the application; and checking the response against the credential.
-
Specification