Remote authentication for multi-core processors
The disclosed techniques are generally directed to the identification of software. In one example of the technique, a private authentication key is stored in hardware. In some examples, during a sequential booting process, a hash for each of the plurality of software levels is calculated in an order...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The disclosed techniques are generally directed to the identification of software. In one example of the technique, a private authentication key is stored in hardware. In some examples, during a sequential booting process, a hash for each of the plurality of software levels is calculated in an order in which the software levels are sequentially booted. The hash of each of the plurality of software levels may be cryptographically appended to a cumulative register. A cumulative register may be used to authenticate software level validity. The plurality of software stages may include a first boot loader for runtime of a first core of the multi-core processor, and for runtime of a first execution environment of a second core of the multi-core processor.
所公开的技术通常针对软件的鉴别。在该技术的一个示例中,私有认证密钥被存储在硬件中。在一些示例中,在顺序引导过程期间,按照软件级被顺序引导的次序,计算多个软件级的每个软件级的哈希。可以将多个软件级的每个软件级的哈希加密地附加到累积寄存器。累积寄存器可用于认证软件级的有效性。多个软件级可以包括第一引导加载器、用于多核处理器的第一核的运行时、以及用于多核处理器的第二核的第一执行环境的运行时。 |
---|