×

Systems and methods using cryptography to protect secure computing environments

DC
  • US 7,904,707 B2
  • Filed: 08/20/2007
  • Issued: 03/08/2011
  • Est. Priority Date: 08/12/1996
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising the steps of:

  • digitally signing a load module using a first key to yield a first digital signature;

    digitally signing the load module using a second key to yield a second digital signature;

    distributing at least the first digital signature to a first remote electronic appliance, wherein the first remote electronic appliance comprises a first protected processing environment operable to authenticate the first digital signature before the first remote electronic appliance executes the load module; and

    distributing at least the second digital signature to a second remote electronic appliance, wherein the second remote electronic appliance comprises a second protected processing environment operable to authenticate the second digital signature before the second remote electronic appliance executes the load module,wherein the first protected processing environment has an assurance level that is different from an assurance level of the second protected processing environment.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×