×

Systems and methods using cryptography to protect secure computing environments

DC
  • US 7,734,553 B2
  • Filed: 08/20/2007
  • Issued: 06/08/2010
  • Est. Priority Date: 08/12/1996
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method performed by an electronic appliance comprising a protected processing environment, the protected processing environment comprising a plurality of processing environments, the method comprising the steps of:

  • receiving a first digital signature associated with a first load module;

    authenticating the first digital signature using a first key; and

    conditionally executing the first load module based at least in part on a result of the authenticating step, including limiting access by the first load module to a first set of resources associated with a first processing environment of the plurality of processing environments;

    wherein the protected processing environment is resistant to tampering by a user of the electronic appliance with at least the steps of authenticating the first digital signature and conditionally executing the first load module.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×