A processor-implemented method for ensuring software integrity

An integrity and processor technology, applied in the direction of platform integrity maintenance, electrical digital data processing, instruments, etc., can solve problems such as decision-making

Active Publication Date: 2013-03-06
NAGRAVISION SA
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] This scheme has the disadvantage that each block thus needs to be read twice
It has another disadvantage: encryption is done block by block instead of instruction by instruction, one decryption key is valid for the whole block
In existing techniques, the encryption key for the next block only depends on the content of the previous block

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A processor-implemented method for ensuring software integrity
  • A processor-implemented method for ensuring software integrity
  • A processor-implemented method for ensuring software integrity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] As stated above, the present invention seeks to provide a means for running software in a secure manner, whereby the software is stored in encrypted form in a memory and decrypted and executed instruction by instruction within a secure processor without the possibility of surveillance sex. The key used for the decryption of the current instruction depends on at least one previous instruction having been correctly decoded, while the key used for the decryption of the following instruction depends on the correct decryption of the current instruction. In this way, a self-checking means for ensuring the integrity of a software is realized. The successful execution of software is to ensure that the process and content are not tampered with, because the modification of an instruction will make the ability to decrypt the following instructions lost, resulting in the hasty termination of the program or at least the collapse of the program execution tracking. The scheme used in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a solution to the problem of guaranteeing the integrity of software programmes by encrypting all or part of each instruction of a programme using a key based on all or part of one or a plurality of previous instructions, thus resulting in a different encryption key per instruction. The invention is applicable to software programmes whose structures are not necessarily tree-like in nature and is also applicable when the programme includes loops, jumps, calls or breaks etc. The invention allows for an exception to be flagged when an encrypted instruction is wrongly decrypted. There is no need for the first instruction to be in clear, since the instruction key may be appropriately initialised as required. The invention can be realised in software or entirely in hardware thereby eliminating the possibility of a third party intercepting a decrypted instruction or a decryption key.

Description

technical field [0001] The present invention relates to the field of software protection, and more particularly to an apparatus and means for making software tamper-proof thereby ensuring the integrity of a piece of software. Background technique [0002] In the field of secure data processing, there is a need to provide a tamper-proof environment within which processing can be performed in a secure manner. A first approach to the problem of application security centers on trying to make the hardware housing the software as secure as possible. The concept of anti-tampering at this time means that this kind of hardware is difficult to open, or once it is opened, it will destroy the chip where the security software is located. Today, however, it is generally realized that software techniques for implementing application security offer more flexibility and lower cost, and in fact, in most cases good application security implies a guarantee that a piece of software has not been...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/54G06F21/72G06F9/30
CPCG06F21/54G06F21/72G06F9/30178
Inventor M·马切蒂H·库戴尔斯基
Owner NAGRAVISION SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products