×

Systems and methods for secure transaction management and electronic rights protection

  • US 8,639,625 B1
  • Filed: 07/30/2007
  • Issued: 01/28/2014
  • Est. Priority Date: 02/13/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system comprising:

  • a host processing system comprising a central processing unit;

    mass storage operatively connected to said central processing unita clock, wherein the value of the clock comprises high-order bits and low-order bits and the high-order bits change on time intervals of at least one hour;

    a storage location containing an encrypted form of an expected execution time duration for a predetermined sequence of instructions; and

    main memory operatively, connected to said central processing unit, wherein the main memory comprises instructions that, when executed by the central processing unit perform the following steps;

    reading a first value of the clock prior to executing the predetermined sequence of instructions whose expected execution time duration is stored in encrypted form in the storage location;

    executing the predetermined sequence of instructions whose expected execution time duration is stored in encrypted form in the storage location;

    reading a second value of the clock subsequent to executing the predetermined sequence of instructions whose expected execution time duration is stored in encrypted form in the storage location;

    calculating the actual execution time duration of the predetermined sequence of instructions by determining a difference between the first value of the clock and the second value of the clock;

    separating the high-order bits of the second value of the clock from the low-order bits of the second value of the clock to form a first portion of the second value of the clock;

    decrypting the encrypted form of the expected execution time duration of the predetermined sequence of instructions stored in the storage location with a decryption key comprising at least in part the first portion of the second value of the clock;

    generating an unencrypted form of the expected execution time duration of the predetermined sequence of instructions and generating both the unencrypted form of the expected execution time duration and the actual execution time duration each at least in part from the second value of the clock; and

    indicating whether the unencrypted form of the expected execution time duration of the predetermined sequence of instructions matches the actual execution time duration of the predetermined sequence of instructions.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×