Controlled secure code authentication

A technology for code and secure storage, applied in the field of code authentication, which can solve problems such as lack of computing power, limited security boot security, and protection restrictions.

Active Publication Date: 2017-08-22
ATMEL CORP
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to cost constraints, the security of local secure boot can be limited due to limited comp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlled secure code authentication
  • Controlled secure code authentication
  • Controlled secure code authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] System Overview

[0011] figure 1 is a block diagram of an example environment 100 according to an implementation. For purposes of illustration, environment 100 includes system 110 having host device 112 and "n" client devices 116a through 116n. Host device 112 communicates with client devices 116 a - 116 n over network 114 , which may be, for example, the local area network of system 110 . It should be noted, however, that the present technology is not limited to the implementation of a local area network; in fact, the network may be other than a local area network, for example, may be a wide area network or a controlled area network (CAN). Additionally, the network 114 may be a wired network, a wireless network, or any combination thereof. The host device 112 is configured to confirm whether the code or program stored in the client device is authorized (or authenticated) code for execution by the client devices 116a-116n. The code of the client device includes at ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems, methods, circuits and computer-readable mediums for controlled secure code authentication are provided. In one aspect, a method performed by a host device includes transmitting a request to a client device, the request including a challenge for a property of a code stored within the client device, receiving a response to the request, the response comprising information associated with the property of the code, verifying correctness of the response based on the received information, and based on the verifying of the correctness of the response, determining that the code is an authorized code.

Description

technical field [0001] The present invention relates generally to code authentication, and in particular to controlled security code authentication. Background technique [0002] In an example scenario, a method is implemented to protect code or programs executing on a device against fraudulently operating modifications or attacks. To illustrate, in an example secure boot method, a processor in the device generates a digest of the boot code and validates the digest of the boot code using a stored authentication signature of the boot code. However, this bootstrap implementation is executed locally by the device's processor, and is thus constrained by the performance, storage, and security of this local processor. Therefore, the security of the host / client network becomes dependent on the security of the processor system on the client side. Due to cost constraints, the security of local secure boot may be limited due to limited computing power or lack of protection of the bo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F21/71
CPCG06F21/71H04L9/3247H04L9/3271H04L63/08H04L63/20H04L63/123H04L67/10G06F21/44G06F21/57H04L67/025G06F2221/2129H04L67/01G06F21/575H04L63/06
Inventor K·D·马莱特斯凯
Owner ATMEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products