Secure computing device having boot read only memory verification of program code

The technical field of this invention is secure computing systems, especially computer systems that may execute after manufacture field provided programs secured to prevent the user from unauthorized use of selected computer services. The computer system may also be functionally reprogrammable in a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Laczko, Sr., Frank L, Ferguson, Edward
Format: Patent
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Laczko, Sr., Frank L
Ferguson, Edward
description The technical field of this invention is secure computing systems, especially computer systems that may execute after manufacture field provided programs secured to prevent the user from unauthorized use of selected computer services. The computer system may also be functionally reprogrammable in a secure manner. A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.
format Patent
fullrecord <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_06775778</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>06775778</sourcerecordid><originalsourceid>FETCH-uspatents_grants_067757783</originalsourceid><addsrcrecordid>eNqNjEsKwjAQQLNxIeod5gJCQTTuRXFbdC9jMqmBJhMmH-jtbcEDuHo8eLy16h9kqhAYDqkWHwew1Lwh-GBb7M1cQAgtcBwnCBRYJmgk3nmDxXMEdpCEB8EwXyxt1crhmGn340bB7fq83Pc1JywUS37N7YLupPVR6_Phj-QLsYQ45A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Secure computing device having boot read only memory verification of program code</title><source>USPTO Issued Patents</source><creator>Laczko, Sr., Frank L ; Ferguson, Edward</creator><creatorcontrib>Laczko, Sr., Frank L ; Ferguson, Edward ; Texas Instruments Incorporated</creatorcontrib><description>The technical field of this invention is secure computing systems, especially computer systems that may execute after manufacture field provided programs secured to prevent the user from unauthorized use of selected computer services. The computer system may also be functionally reprogrammable in a secure manner. A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</description><language>eng</language><creationdate>2004</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/6775778$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,780,802,885,64038</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/6775778$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Laczko, Sr., Frank L</creatorcontrib><creatorcontrib>Ferguson, Edward</creatorcontrib><creatorcontrib>Texas Instruments Incorporated</creatorcontrib><title>Secure computing device having boot read only memory verification of program code</title><description>The technical field of this invention is secure computing systems, especially computer systems that may execute after manufacture field provided programs secured to prevent the user from unauthorized use of selected computer services. The computer system may also be functionally reprogrammable in a secure manner. A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2004</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNqNjEsKwjAQQLNxIeod5gJCQTTuRXFbdC9jMqmBJhMmH-jtbcEDuHo8eLy16h9kqhAYDqkWHwew1Lwh-GBb7M1cQAgtcBwnCBRYJmgk3nmDxXMEdpCEB8EwXyxt1crhmGn340bB7fq83Pc1JywUS37N7YLupPVR6_Phj-QLsYQ45A</recordid><startdate>20040810</startdate><enddate>20040810</enddate><creator>Laczko, Sr., Frank L</creator><creator>Ferguson, Edward</creator><scope>EFH</scope></search><sort><creationdate>20040810</creationdate><title>Secure computing device having boot read only memory verification of program code</title><author>Laczko, Sr., Frank L ; Ferguson, Edward</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_067757783</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2004</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Laczko, Sr., Frank L</creatorcontrib><creatorcontrib>Ferguson, Edward</creatorcontrib><creatorcontrib>Texas Instruments Incorporated</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Laczko, Sr., Frank L</au><au>Ferguson, Edward</au><aucorp>Texas Instruments Incorporated</aucorp><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Secure computing device having boot read only memory verification of program code</title><date>2004-08-10</date><risdate>2004</risdate><abstract>The technical field of this invention is secure computing systems, especially computer systems that may execute after manufacture field provided programs secured to prevent the user from unauthorized use of selected computer services. The computer system may also be functionally reprogrammable in a secure manner. A secure computing system stores a program, preferably the real time operating system, that is encrypted with a private key. A boot ROM on the same integrated circuit as the data processor and inaccessible from outside includes an initialization program and a public key corresponding to the private key. On initialization the boot ROM decrypts at least a verification portion of the program. This enables verification or non-verification of the security of the program. The boot ROM may store additional public keys for verification of application programs following verification of the real time operating system. Alternatively, these additional public keys may be stored in the nonvolatile memory. On verification of the security of the program, normal operation is enabled. On non-verification, system could be disabled, or that application program could be disabled. The system could notify the system vendor of the security violation using the modem of the secure computing system. This technique is applicable to downloaded programs could be applied to after sale acquired application programs. On downloading the after acquired program they decrypted using an additional public key.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_uspatents_grants_06775778
source USPTO Issued Patents
title Secure computing device having boot read only memory verification of program code
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T11%3A11%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Laczko,%20Sr.,%20Frank%20L&rft.aucorp=Texas%20Instruments%20Incorporated&rft.date=2004-08-10&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E06775778%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true