Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for code authentication

A code and memory technology, applied in the field of boot control mechanism using hardware signature, can solve the problems of low speed of hashing system and verification process

Inactive Publication Date: 2007-12-19
INT BUSINESS MASCH CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, hashing systems generally provide a slower verification process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for code authentication
  • System and method for code authentication
  • System and method for code authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In the following discussion, numerous specific details are set forth to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known elements have been shown in schematic or block diagram form, in order not to obscure the invention in unnecessary detail. In addition, for the most part, details related to network communication, electromagnetic signaling technology, etc. have been omitted as far as possible, as long as these details are not considered necessary for a thorough understanding of the present invention and are considered to be understood by those in the relevant technical circles .

[0011] Also, note that unless otherwise stated, all functions described herein can be performed by either hardware or software, a microprocessor executing firmware, or some combination thereof. In one embodiment, coded applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides for authentication of code, such as boot code. A memory addressing engine is employable to select a portion of a memory, as a function of a step value, as a first input hash value. The step value allows for the non-commutative cumulative hashing of a plurality of memory portions with a second input hash value, such as a previous hash value that has been rotated left. An authenticator circuit is employable to perform a hash upon the portion of memory and the second input hash value. A comparison circuit is then employable to compare an output of the authenticator circuit to an expected value.

Description

technical field [0001] The present invention relates generally to boot control mechanisms, and more particularly, the present invention relates to boot control mechanisms employing hardware signatures. Background technique [0002] Security in computer systems is a concern. Unauthorized reading of code or data or inadvertent or malicious alteration of code or data in computer systems can occur. [0003] A common solution for security of the boot code process is to employ a software cryptographic lock, also known as a software cryptographic signature. Generally, when a suspicious boot code is encountered, the software password lock or software password signature analyzes a piece of boot code by executing a function, such as a hash function. If the value calculated by the hash function is correct (ie, the software "signature" is correct), the suspicious code is considered safe and allowed to access the system. [0004] However, there are a number of problems associated with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/00
CPCG06F21/575
Inventor D·J·克拉夫特
Owner INT BUSINESS MASCH CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More