Systems and methods using cryptography to protect secure computing environments
DCFirst Claim
1. A method including the following:
- at a certification authority, receiving an executable program generated by a party independent of the certification authority;
at the certification authority, testing the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program;
at the certification authority, generating a digital certificate certifying that the executable program operates in the manner described in the specification;
receiving the executable program at a user site;
receiving the digital certificate at the user site, the digital certificate specifying a security level;
at the user site, evaluating the digital certificate to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program, said evaluation including comparing the security level to a required security level; and
at the user site, executing the executable program, the execution being dependent on the evaluation of the digital certificate;
wherein the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user at the user site, with the performance of said step of evaluating the digital certificate.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.
551 Citations
10 Claims
-
1. A method including the following:
-
at a certification authority, receiving an executable program generated by a party independent of the certification authority; at the certification authority, testing the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; at the certification authority, generating a digital certificate certifying that the executable program operates in the manner described in the specification; receiving the executable program at a user site; receiving the digital certificate at the user site, the digital certificate specifying a security level; at the user site, evaluating the digital certificate to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program, said evaluation including comparing the security level to a required security level; and at the user site, executing the executable program, the execution being dependent on the evaluation of the digital certificate; wherein the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user at the user site, with the performance of said step of evaluating the digital certificate.
-
-
2. A method including the following:
-
at a certification authority, receiving an executable program generated by a party independent of the certification authority; at the certification authority, testing the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; at the certification authority, generating a digital certificate certifying that the executable program operates in the manner described in the specification; receiving the executable program at a user site; receiving the digital certificate at the user site; at the user site, evaluating the digital certificate to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program, said evaluation including comparing a hash value stored in the digital certificate to a hash of at least a portion of the executable program; and at the user site, executing the executable program, the execution being dependent on the evaluation of the digital certificate; wherein the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user at the user site, with the performance of said step of evaluating the digital certificate. - View Dependent Claims (3)
-
-
4. A method including the following:
-
at a certification authority, receiving an executable program generated by a party independent of the certification authority; at the certification authority, testing the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; at the certification authority, generating a digital certificate certifying that the executable program operates in the manner described in the specification; receiving the executable program at a user site; receiving the digital certificate at the user site; at the user site, evaluating the digital certificate to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program; and at the user site, executing the executable program, the execution being dependent on the evaluation of the digital certificate; wherein the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user at the user site, with the performance of said step of evaluating the digital certificate, and wherein the digital certificate includes the specification, and the step of evaluating the digital certificate includes evaluating the specification.
-
-
5. A method comprising:
-
receiving, at a certification authority, an executable program generated by a party independent of the certification authority; testing, at the certification authority, the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; generating, at the certification authority, a digital certificate certifying that the executable program operates in a manner described by the specification; sending, by the certification authority, the executable program to a user site; and sending, by the certification authority, the digital certificate to the user site, wherein the user site includes a tamper-resistant execution space configured to evaluate the digital certificate based on a comparison of a hash value stored in the digital certificate to a hash of at least a portion of the executable program to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program. - View Dependent Claims (6)
-
-
7. A method comprising:
-
receiving, at a certification authority, an executable program generated by a party independent of the certification authority; testing, at the certification authority, the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; generating, at the certification authority, a digital certificate certifying that the executable program operates in the manner described in the specification; sending, by the certification authority, the executable'"'"'program to a user site; and sending, by the certification authority, the digital certificate that includes the specification; wherein the user site includes a tamper-resistant execution space, the tamper-resistant execution space being configured to evaluate the digital certificate based on the included specification to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program.
-
-
8. A method comprising:
-
receiving, at a user site, an executable program; receiving, at the user site, a digital certificate generated by a certification authority certifying that an executable program operates in a manner described in a specification, the specification being generated by the certification authority and describing the actual operation of the executable program; evaluating, at the user site, the digital certificate to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program, said evaluation including comparing a hash value stored in the digital certificate to a hash of at least a portion of the executable program; and executing, at the user site, the executable program, the execution being dependent on the evaluation of the digital certificate; wherein the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user of the user site, with the performance of said step of evaluating the digital certificate. - View Dependent Claims (9)
-
-
10. A method comprising:
-
receiving, at a user site, an executable program; receiving, at the user site, a digital certificate that includes a specification, the digital certificate being generated by a certification authority certifying that an executable program operates in a manner described in the specification, the specification being generated by the certification authority and describing the actual operation of the executable program; evaluating, at the user site, the digital certificate to determine (a) if the digital certificate is associated with the executable program, and (b) whether to execute the executable program, said evaluation including comparing a hash value stored in the digital certificate to a hash of at least a portion of the executable program; and executing, at the user site, the executable program, the execution being dependent on the evaluation of the digital certificate; wherein the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user of the user site, with the performance of said step of evaluating the digital certificate, and wherein the step of evaluating the digital certificate includes evaluating the specification.
-
Specification