发明名称 System and method for authenticating software using hidden intermediate keys
摘要 A processing unit includes a read-only encryption key. Loader code image is loaded into system memory from non-volatile storage. Loader code image includes a prefix value and a suffix value. The prefix value is combined with the master key from the processing unit to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.
申请公布号 US2005010767(A1) 申请公布日期 2005.01.13
申请号 US20030464884 申请日期 2003.06.19
申请人 INTERNATIONAL BUSINESS MACHINES CORPORATION 发明人 CRAFT DAVID
分类号 G06F21/00;(IPC1-7):H04L9/00 主分类号 G06F21/00
代理机构 代理人
主权项
地址