Unlock instant, AI-driven research and patent intelligence for your innovation.

Controlled Security Code Verification

A code and verification device technology, applied in the field of code verification, can solve the problems of destroying the safe boot operation and the like

Active Publication Date: 2022-05-17
ATMEL CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there may be multiple attack vectors that would allow an attacker to subvert secure boot operations and allow fraudulent operations, for example, modifying boot code using a man-in-the-middle device, or modifying certified root public keys or signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlled Security Code Verification
  • Controlled Security Code Verification
  • Controlled Security Code Verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] System Overview

[0012] Figure 1A is a block diagram of an example environment 100 according to an implementation. For purposes of illustration, environment 100 includes system 116 (eg, a client-side system) that includes client device 120 and authentication (Auth) device 118 . The verification device 118 is configured to verify whether the code or program stored in the client device 120 is authorized (or verified) code. The code of the client device 120 includes at least one of an activation code for enabling the client device 120 to start (or activate) or an operation code for causing the client device 120 to perform a corresponding operation.

[0013] Authentication device 118 is coupled to client device 120 via connection 119 . In some implementations, the authentication device 118 and the client device 120 are placed proximately, and the connection 119 is wired through a data cable (eg, a fiber optic cable or a conductive cable) or is wireless. In some other i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides systems, methods, circuits and computer readable media for controlled security code verification. In one aspect, a non-transitory computer-readable storage medium has stored thereon instructions which, when executed by one or more processors, cause the one or more processors to perform a method comprising: sending a request to to a client device, the request comprising a query about properties from a particular portion of code stored within the client device, the query including an indication of the data for a particular memory address range; receiving a response to the request from the client device, the response including information associated with the property of the code; verifying the response based on the received information correctness; and based on verifying the correctness of the response, determining that the code is an authorized code.

Description

technical field [0001] The present invention relates generally to code verification, and in particular to controlled security code verification. Background technique [0002] In an example scenario, a method to protect code or programs executing on a device from fraudulently operating modification or attack is implemented. For example, in an example secure boot method, a processor in a device generates a digest of boot code and verifies the digest of the boot code using a stored verification signature of the boot code. However, this launch implementation is executed locally by the processor of the device, and is thus limited by the performance, storage, and security of this local processor. Due to cost constraints, the security of local secure boot may be limited due to limited computing power or lack of protection of the boot process, operating memory, and / or authentication keys. In some cases, an external device is used to verify authenticity and report the result of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/125G06F21/57H04L9/3271H04L63/0807G06F2221/2129G06F21/44H04L9/3242H04L9/3247H04L63/0876G06F21/575G06F21/602G06F21/64G06F2221/033H04L9/3066H04L9/3239
Inventor K·D·马莱特斯凯
Owner ATMEL CORP