Electronic devices, information products, processes of manufacture and apparatus for enabling code decryption in a secure mode using decryption wrappers and key programming applications, and other structures
First Claim
1. An electronic device comprising:
- a non-volatile store holding a plurality of encrypted sub-applications, and application-specific identifications to respectively identify the encrypted sub-applications, and at least one wrapper having a representation of code to call a function and supply a said application-specific identification to the called function to determine a storage location and access the storage location for contents and to call for decryption of an encrypted sub-application corresponding to the said application-specific identification in response to contents of the storage location as a content decryption key for the decryption; and
a processor coupled to said non-volatile store and operable for;
at a first time, performing an application for decrypting a first form of an encrypted key with a first key to provide a recovered key, wherein the encrypted sub-application has been encrypted using the recovered key;
at a second time following the first time;
encrypting the recovered key into a second form of an encrypted key using a key unique to the electronic device; and
storing the second form in the storage location; and
accessing the representation of code and executing the code so as to decrypt the encrypted sub-application in response to the second form; and
circuitry for deleting from the electronic device the application for decrypting a first form and the first form of an encrypted key after the first time.
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic device (1640) includes a non-volatile store (1620) holding a plurality of encrypted sub-applications (SubApp n), and application-specific identifications (ASIDs) to respectively identify the encrypted sub-applications (SubApp n), and at least one wrapper having a representation of code to call (2220) a function (KPPA2) and supply a said application-specific identification (ASID) to the called function (KPPA2) to determine a storage location (UU) and access (2250) the storage location (UU) for contents and to call (2260) for decryption of the encrypted sub-application (SubApp n) using the contents of the storage location (UU) as a key; and a processor (1660) coupled to said non-volatile store (1620) and operable to access the representation of code and execute the code (2220, 2260). Various electronic devices, information products, processes of manufacture, and apparatus are disclosed and claimed.
54 Citations
14 Claims
-
1. An electronic device comprising:
-
a non-volatile store holding a plurality of encrypted sub-applications, and application-specific identifications to respectively identify the encrypted sub-applications, and at least one wrapper having a representation of code to call a function and supply a said application-specific identification to the called function to determine a storage location and access the storage location for contents and to call for decryption of an encrypted sub-application corresponding to the said application-specific identification in response to contents of the storage location as a content decryption key for the decryption; and a processor coupled to said non-volatile store and operable for; at a first time, performing an application for decrypting a first form of an encrypted key with a first key to provide a recovered key, wherein the encrypted sub-application has been encrypted using the recovered key; at a second time following the first time; encrypting the recovered key into a second form of an encrypted key using a key unique to the electronic device; and storing the second form in the storage location; and accessing the representation of code and executing the code so as to decrypt the encrypted sub-application in response to the second form; and circuitry for deleting from the electronic device the application for decrypting a first form and the first form of an encrypted key after the first time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification