Secure computing device having boot read only memory verification of program code

A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: FERGUSON EDWARD, LACZKO, SR. FRANK L
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator FERGUSON EDWARD
LACZKO, SR. FRANK L
description A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US6775778B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US6775778B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US6775778B13</originalsourceid><addsrcrecordid>eNqNjDEKAjEUBdNYiHqHfwELEY21otjKar18k5c1sMkP2Wxgb6-CB7AaBoaZq1sDM2aQkZDG4mNHFtUb0Ivr154ihTLYksR-ooAgeaKK7J03XLxEEkcpS5c5fC4WSzVz3A9Y_bhQdDnfT9c1krQYEhtElPbR7LXeaX04brZ_JG-NFzfG</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Secure computing device having boot read only memory verification of program code</title><source>esp@cenet</source><creator>FERGUSON EDWARD ; LACZKO, SR. FRANK L</creator><creatorcontrib>FERGUSON EDWARD ; LACZKO, SR. FRANK L</creatorcontrib><description>A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</description><edition>7</edition><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2004</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20040810&amp;DB=EPODOC&amp;CC=US&amp;NR=6775778B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20040810&amp;DB=EPODOC&amp;CC=US&amp;NR=6775778B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>FERGUSON EDWARD</creatorcontrib><creatorcontrib>LACZKO, SR. FRANK L</creatorcontrib><title>Secure computing device having boot read only memory verification of program code</title><description>A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2004</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjDEKAjEUBdNYiHqHfwELEY21otjKar18k5c1sMkP2Wxgb6-CB7AaBoaZq1sDM2aQkZDG4mNHFtUb0Ivr154ihTLYksR-ooAgeaKK7J03XLxEEkcpS5c5fC4WSzVz3A9Y_bhQdDnfT9c1krQYEhtElPbR7LXeaX04brZ_JG-NFzfG</recordid><startdate>20040810</startdate><enddate>20040810</enddate><creator>FERGUSON EDWARD</creator><creator>LACZKO, SR. FRANK L</creator><scope>EVB</scope></search><sort><creationdate>20040810</creationdate><title>Secure computing device having boot read only memory verification of program code</title><author>FERGUSON EDWARD ; LACZKO, SR. FRANK L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US6775778B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2004</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>FERGUSON EDWARD</creatorcontrib><creatorcontrib>LACZKO, SR. FRANK L</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>FERGUSON EDWARD</au><au>LACZKO, SR. FRANK L</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Secure computing device having boot read only memory verification of program code</title><date>2004-08-10</date><risdate>2004</risdate><abstract>A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</abstract><edition>7</edition><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US6775778B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Secure computing device having boot read only memory verification of program code
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T01%3A10%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=FERGUSON%20EDWARD&rft.date=2004-08-10&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS6775778B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true