Secure computing device having boot read only memory verification of program code
A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | FERGUSON EDWARD LACZKO, SR. FRANK L |
description | A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US6775778B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US6775778B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US6775778B13</originalsourceid><addsrcrecordid>eNqNjDEKAjEUBdNYiHqHfwELEY21otjKar18k5c1sMkP2Wxgb6-CB7AaBoaZq1sDM2aQkZDG4mNHFtUb0Ivr154ihTLYksR-ooAgeaKK7J03XLxEEkcpS5c5fC4WSzVz3A9Y_bhQdDnfT9c1krQYEhtElPbR7LXeaX04brZ_JG-NFzfG</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Secure computing device having boot read only memory verification of program code</title><source>esp@cenet</source><creator>FERGUSON EDWARD ; LACZKO, SR. FRANK L</creator><creatorcontrib>FERGUSON EDWARD ; LACZKO, SR. FRANK L</creatorcontrib><description>A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</description><edition>7</edition><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2004</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20040810&DB=EPODOC&CC=US&NR=6775778B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20040810&DB=EPODOC&CC=US&NR=6775778B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>FERGUSON EDWARD</creatorcontrib><creatorcontrib>LACZKO, SR. FRANK L</creatorcontrib><title>Secure computing device having boot read only memory verification of program code</title><description>A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2004</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjDEKAjEUBdNYiHqHfwELEY21otjKar18k5c1sMkP2Wxgb6-CB7AaBoaZq1sDM2aQkZDG4mNHFtUb0Ivr154ihTLYksR-ooAgeaKK7J03XLxEEkcpS5c5fC4WSzVz3A9Y_bhQdDnfT9c1krQYEhtElPbR7LXeaX04brZ_JG-NFzfG</recordid><startdate>20040810</startdate><enddate>20040810</enddate><creator>FERGUSON EDWARD</creator><creator>LACZKO, SR. FRANK L</creator><scope>EVB</scope></search><sort><creationdate>20040810</creationdate><title>Secure computing device having boot read only memory verification of program code</title><author>FERGUSON EDWARD ; LACZKO, SR. FRANK L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US6775778B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2004</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>FERGUSON EDWARD</creatorcontrib><creatorcontrib>LACZKO, SR. FRANK L</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>FERGUSON EDWARD</au><au>LACZKO, SR. FRANK L</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Secure computing device having boot read only memory verification of program code</title><date>2004-08-10</date><risdate>2004</risdate><abstract>A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</abstract><edition>7</edition><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US6775778B1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Secure computing device having boot read only memory verification of program code |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T01%3A10%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=FERGUSON%20EDWARD&rft.date=2004-08-10&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS6775778B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |