Method of and apparatus for reproducing information, and security module
First Claim
Patent Images
1. An information reproducing apparatus using an operating system, comprising:
- a hardware secure module having a tamper resistant module structure inaccessible from outside that stores information related to secure software;
a memory that stores the secure software;
a storage controller that is loaded on the hardware secure module and stores an updated secure software in an unswappable area of the memory using a direct access method;
a falsification checking unit that is loaded on the hardware secure module, wherein the falsification checking unit reads the secure software from the memory by direct access without using the operating system, compares the read secure software with the information related to the secure software stored in the hardware secure module, and checks whether the secure software is falsified based on a result of the comparison; and
a processor that executes the secure software when a result of the check by the falsification checking unit is that the secure software is not falsified, andwherein the storage controller instructs the processor to change over from the secure software executed to the updated secure software stored in the unswappable area of the memory and to execute the updated secure software.
1 Assignment
0 Petitions
Accused Products
Abstract
An information reproducing apparatus of the present invention includes a secure module and a main memory. The information in the secure module can not be accessed from outside. The secure module reads, using a direct access method, information relating to software stored in the main memory. The secure module checks a falsification of the software by comparing the information read with the information stored in advance in the secure module.
-
Citations
39 Claims
-
1. An information reproducing apparatus using an operating system, comprising:
-
a hardware secure module having a tamper resistant module structure inaccessible from outside that stores information related to secure software; a memory that stores the secure software; a storage controller that is loaded on the hardware secure module and stores an updated secure software in an unswappable area of the memory using a direct access method; a falsification checking unit that is loaded on the hardware secure module, wherein the falsification checking unit reads the secure software from the memory by direct access without using the operating system, compares the read secure software with the information related to the secure software stored in the hardware secure module, and checks whether the secure software is falsified based on a result of the comparison; and a processor that executes the secure software when a result of the check by the falsification checking unit is that the secure software is not falsified, and wherein the storage controller instructs the processor to change over from the secure software executed to the updated secure software stored in the unswappable area of the memory and to execute the updated secure software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An information reproducing method using an operating system, comprising:
-
reading a secure software stored in a memory using direct access method without using the operating system, by a hardware secure module having a tamper resistant module structure inaccessible from outside which stores information related to the secure software; storing an updated secure software in an unswappable area of the memory using a direct access method; checking falsification by a falsification checking unit that is loaded on the hardware secure module, by comparing the secure software read at the reading with the information related to the secure software stored in the hardware module; determining whether the secure software is falsified based on a result of the comparison; and executing the secure software by a processor when a result of determining is that the secure software is not falsified, and wherein the storing includes instructing the processor to change over from the secure software executed to the undated secure software stored in the unswappable area of the memory and to execute the updated secure software.
-
-
20. A hardware secure module mounted to an information reproducing apparatus, comprising:
-
a reading unit that reads a secure software from a memory mounted to the information reproducing apparatus by direct access without using an operating system; and a storage controller that stores an updated secure software in an unswappable area of the memory using a direct access method; a falsification checking unit that compares the secure software read at the reading with information related to the secure software stored in the hardware secure module, and checks a falsification of the secure software based on a result of the comparison, and wherein the hardware secure module has a tamper resistant module structure inaccessible from outside and when the result of the comparison shows that the secure software is not falsified, the secure software is executed by the information reproducing apparatus, and wherein the storage controller instructs the information reproducing apparatus to change over from the secure software executed to the updated secure software stored in the unswappable area of the memory and to execute the updated secure software. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A recording medium that records a program for causing a hardware secure module mounted to an information reproducing apparatus to execute a process, the process comprising:
-
reading secure software stored in a memory using a direct access method and without using an operating system, by the hardware secure module having a tamper resistant module structure inaccessible from outside that stores information related to the secure software; storing an updated secure software in an unswappable area of the memory using a direct access method; checking falsification by comparing the secure software read at the reading with the information related to the secure software stored in the hardware secure module, and determining a falsification of the secure software based on a result of the comparison; and executing the secure software when the result of the comparison is that the secure software is not falsified, and wherein the storing includes instructing the executing to change over from the secure software executed to the updated secure software stored in the unswappable area of the memory and to execute the updated secure software.
-
-
39. A method of a reproducing verified information, comprising:
-
executing a secure software stored in a memory accessible to an information reproducing apparatus using a direct access method, when comparison of the secure software read by direct access method with information related to the secure software stored in a hardware secure module having a tamper resistant module structure inaccessible from outside, indicates that the secure software is not falsified; and storing an updated secure software in an unswappable area of the memory using a direct access method; and wherein the storing includes instructing the executing to change over from the secure software executed to the updated secure software stored in the unswappable area of the memory and to execute the updated secure software.
-
Specification