×

Associating software with hardware using cryptography

  • US 8,041,957 B2
  • Filed: 03/31/2004
  • Issued: 10/18/2011
  • Est. Priority Date: 04/08/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method of validating an association of software code with hardware, comprising:

  • obtaining a certificate from a code image, wherein;

    the code image further including software code, a code signature, and a first identifier associated with a release of the software code,all instances of the software code associated with the software release have the same first identifier such that at least two instances of the software code have the same first identifier,the code signature is generated, using cryptography and a code private key, based on the first identifier, a second identifier for the hardware, and a message code digest obtained by hashing the software code,the code signature is used to validate an association of the software code with the hardware,the certificate includes a code public key corresponding to the code private key, and an authority signature generated over the code public key using cryptography and an authority private key;

    authenticating the certificate with an authority public key securely stored in the hardware;

    obtaining the first identifier from the code image;

    obtaining the second identifier for the hardware, wherein all instances of a particular configuration of the hardware have the same second identifier such that at least two instances of the hardware have the same second identifier;

    obtaining the software code from the code image and generating an image code digest by hashing the software code from the code image;

    generating a regenerated signature digest by hashing the image code digest, the first identifier, and the second identifier; and

    obtaining the code signature from the code image and generating a received signature digest by decrypting the code signature from the code image using the code public key; and

    comparing the regenerated signature digest with the received signature digest, wherein the association of the software code with the hardware is validated if the regenerated signature digest matches the received signature digest.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×