Configurable signature for authenticating data or program code
First Claim
1. A method, comprising:
- retrieving configuration information from a protected first memory, wherein the configuration information specifies a plurality of non-contiguous memory locations, wherein the plurality of non-contiguous memory locations store one or more parameters for a signature formula;
retrieving the one or more parameters for the signature formula from the plurality of non-contiguous memory locations based on the configuration information; and
calculating a first signature formula;
wherein the first signature is useable to verify security for a system.
10 Assignments
0 Petitions
Accused Products
Abstract
System and method for authenticating data or program code via a configurable signature. Configuration information is retrieved from a protected first memory, e.g., an on-chip register, where the configuration information specifies a plurality of non-contiguous memory locations that store the signature, e.g., in an on-chip memory trailer. The signature is retrieved from the plurality of non-contiguous memory locations based on the configuration information, where the signature is useable to verify security for a system. The signature corresponds to specified data and/or program code stored in a second memory, e.g., in off-chip ROM. The specified data and/or program code may be copied from the second memory to a third memory, and a signature for the specified data and/or program code calculated based on the configuration information. The calculated signature may be compared with the retrieved signature to verify the specified data and/or program code.
-
Citations
20 Claims
-
1. A method, comprising:
-
retrieving configuration information from a protected first memory, wherein the configuration information specifies a plurality of non-contiguous memory locations, wherein the plurality of non-contiguous memory locations store one or more parameters for a signature formula; retrieving the one or more parameters for the signature formula from the plurality of non-contiguous memory locations based on the configuration information; and calculating a first signature formula; wherein the first signature is useable to verify security for a system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for authenticating data or program code, comprising:
-
an embedded processor; and a protected first memory coupled to the embedded processor, wherein the protected first memory stores configuration information specifying a plurality of non-contiguous memory locations that store one or more parameters for a signature formula; wherein the embedded processor is operable to retrieve the one or more parameters for the signature formula from the plurality of non-contiguous memory locations based on the configuration information and to calculate a first signature using the signature formula, wherein the signature is useable to verify security for a system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification