×

Trusting an unverified code image in a computing device

  • US 8,291,480 B2
  • Filed: 01/07/2007
  • Issued: 10/16/2012
  • Est. Priority Date: 01/07/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method, comprising:

  • verifying a code image in a device according to a key stored within a memory of the device, the key uniquely identifying the device;

    executing, if the code image is successfully verified, the code image configuring the key including one of enabling and disabling the key according to a predetermined condition, wherein the code image is loaded from a provider to set up at least one component of an operating environment of the device, the provider satisfying the predetermined condition, the configuration of the key capable of preventing an application code image from compromising user data stored in a storage of the device, the user data including content associated with a user of the device, wherein the code image and the application code image are separate executable code images for the device, wherein the application code image is not verified for the device and wherein the application code image is capable of sending a request to access the user data;

    loading, subsequent to the execution of the code image, the application code image into the device for execution without verifying the application code image according to the key; and

    in response to the request from the execution of the application code image to access the user data, executing a secure code in the memory to determine whether the key is enabled to grant the request to access the user data according to the configuration of the key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×