Systems and methods using cryptography to protect secure computing environments
First Claim
1. A non-transitory computer-readable storage medium comprising program code, the program code being operable, when executed by a computer system, to cause the computer system to perform steps comprising:
- testing a load module to determine if the load module performs as specified by a specification associated with the load module and determine if the load module would be harmful to a system when executed by the system;
wherein the specification identifies the load module and describes the functions of the load module,digitally signing the load module using a first key to yield a first digital signature when it is determined that the load module performs as specified by the specification and would not be harmful to a system when executed by the system;
digitally signing a second load module using a second key to yield a second digital signature when it is determined that the second load module performs as specified by the specification and would not be harmful to a system if executed by the system;
distributing at least the first digital signature to a first remote electronic appliance comprising a first protected processing environment operable to authenticate the first digital signature before the first remote electronic appliance executes the load module, wherein the load module, when executed by the first remote electronic appliance, causes the first remote electronic appliance to perform at least one action on a first electronic content; and
,distributing at least the second digital signature to a second remote electronic appliance comprising a second protected processing environment operable to authenticate the second digital signature before the second remote electronic appliance executes the second load module, wherein the second load module, when executed by the second remote electronic appliance, causes the second remote electronic appliance to perform at least one action on a second electronic content.
2 Assignments
0 Petitions
Accused Products
Abstract
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.
-
Citations
9 Claims
-
1. A non-transitory computer-readable storage medium comprising program code, the program code being operable, when executed by a computer system, to cause the computer system to perform steps comprising:
-
testing a load module to determine if the load module performs as specified by a specification associated with the load module and determine if the load module would be harmful to a system when executed by the system; wherein the specification identifies the load module and describes the functions of the load module, digitally signing the load module using a first key to yield a first digital signature when it is determined that the load module performs as specified by the specification and would not be harmful to a system when executed by the system; digitally signing a second load module using a second key to yield a second digital signature when it is determined that the second load module performs as specified by the specification and would not be harmful to a system if executed by the system; distributing at least the first digital signature to a first remote electronic appliance comprising a first protected processing environment operable to authenticate the first digital signature before the first remote electronic appliance executes the load module, wherein the load module, when executed by the first remote electronic appliance, causes the first remote electronic appliance to perform at least one action on a first electronic content; and
,distributing at least the second digital signature to a second remote electronic appliance comprising a second protected processing environment operable to authenticate the second digital signature before the second remote electronic appliance executes the second load module, wherein the second load module, when executed by the second remote electronic appliance, causes the second remote electronic appliance to perform at least one action on a second electronic content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification