Apparatus and method for authenticating a flash program

A technology of programs and flash memory, which is applied in the field of programs downloaded to flash memory, can solve problems such as security vulnerabilities, and achieve the effect of improving effectiveness and reducing security vulnerabilities

Inactive Publication Date: 2009-07-29
MEDIATEK INC
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem in the prior art that only using the hardware unique key to authenticate the program downloaded to the flash memory leads to security breaches, the present invention provides a device and method for authenticating the program downloaded to the flash memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for authenticating a flash program
  • Apparatus and method for authenticating a flash program
  • Apparatus and method for authenticating a flash program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Certain terms are used throughout the description and claims to refer to particular components. Those of ordinary skill in the art will appreciate that manufacturers may refer to the same component by different terms. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a basis for distinction. "Includes" mentioned throughout the specification and claims is an open term, so it should be interpreted as "including but not limited to". In addition, the term "coupled" herein includes any direct and indirect means of electrical connection. Therefore, if it is described that the first device is coupled to the second device, it means that the first device may be directly electrically connected to the second device, or indirectly electrically connected to the second device through other devices or connection means.

[0021] figure 1 A block diagram of the encryption system. Pla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a device and method to download authentication onto flash memory program, wherein the device comprises: a hardware unique key, a register storing a customer identity (ID) and a message authentication code (MAC) generation unit. The MAC generation unit acquires a root key corresponding to the hardware unique key and the customer ID, and generates a MAC for the flash program using the acquired root key, wherein the content of the register is locked to avoid modification of the stored customer ID until the next system reset. The device and method to download authentication onto flash memory program, which authenticates program downloaded onto the flash memory by the hardware unique key and user information together, can reduce security leak and enhance validity of the authentication device and authentication method.

Description

technical field [0001] The present invention relates to the program downloaded to the flash memory, in particular to the device and method for authenticating the program downloaded to the flash memory. Background technique [0002] One form of security mechanism uses a hardware unique key loaded into the chip. Therefore, in various applications, a hardware unique key is loaded onto the chip to meet the cryptographic requirements of confidentiality, integrity and authenticity. As such, the hardware unique key is unique to each chip. That is, if the hardware unique key is loaded into the chip, the value of the hardware unique key cannot be changed. Another advantage of using a hardware unique key is that the hardware unique key cannot be read externally. Therefore, hardware unique keys are widely used as a security mechanism. Usually, the initial information transmitted to the chip is encrypted by a hardware unique key, and the output encrypted information cannot be read d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F9/445
CPCG06F21/572G06F21/64H04L2209/60H04L9/3242G06F2221/2107G06F2221/2117
Inventor 杨庆昭杨宗宪
Owner MEDIATEK INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products