发明名称 Systems and methods using cryptography to protect secure computing environments
摘要 Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority-which may be a trusted independent third party-tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)-allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm.
申请公布号 US6292569(B1) 申请公布日期 2001.09.18
申请号 US20000678830 申请日期 2000.10.04
申请人 INTERTRUST TECHNOLOGIES CORP. 发明人 SHEAR VICTOR H.;SIBERT W. OLIN;VAN WIE DAVID M.
分类号 G06F1/00;G06F12/14;G06F21/00;G06Q20/00;G11B20/00;G11B27/031;G11B27/32;H04L9/30;H04L9/32;H04L12/40;H04L12/64;(IPC1-7):H04K1/00;H04L9/00;G06F11/30 主分类号 G06F1/00
代理机构 代理人
主权项
地址
您可能感兴趣的专利