Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure software authentication and verification

A software, non-secure technology, applied in secure communication devices, digital data authentication, computer security devices, etc., can solve problems such as low power processing capacity/resource difficulties

Active Publication Date: 2017-12-01
QUALCOMM INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, authentication using public keys is processing intensive and difficult for many devices that are low power or have very little processing power / resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure software authentication and verification
  • Secure software authentication and verification
  • Secure software authentication and verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In the following description, specific details are given to provide a thorough understanding of the described embodiments. However, one skilled in the art will understand that the described embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order to avoid obscuring the implementations in unnecessary detail. In other instances, well-known circuits, structures and techniques may be shown in detail in order not to obscure the implementations.

[0025] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment or embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or embodiments. Likewise, the term "embodiments" does not require that all embodiments include the discussed feature, advantage or mode of operation.

[0026] Overview

[0027] One feature provides secure loading and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A first time software is loaded for execution by a device, the software stored in non-secure storage is authenticated. Authenticating the software may involve a cryptographic operation over the software and a digital signature of the software. A verification tag may be generated for the software if authentication of the software is successful, the verification tag based on the software and at least a device-specific secret data. The verification tag may be stored within the device. Each subsequent time the software is loaded for execution it may be verified (not authenticated) by using the verification tag to confirm that the software being loaded is the same as the one used to generate the verification tag while avoiding authentication of the software.

Description

[0001] CROSS-REFERENCE TO RELATED APPLICATIONS [0002] This application claims priority to and the benefit of non-provisional application Ser. No. 14 / 687,783, filed in the United States Patent and Trademark Office on April 15, 2015, the entire contents of which are incorporated herein by reference. technical field [0003] Various features disclosed herein relate generally to authentication of software to reduce hacking of software in devices lacking secure storage, and more particularly to a method of performing software authentication when software is first executed and thereafter A more efficient approach to software verification. Background technique [0004] such as mobile phones, mobile devices, pagers, wireless modems, personal digital assistants, tablet computers, personal information managers (PIMs), personal media players, palmtops, laptops, or any other device with a processor Devices are becoming more popular and ubiquitous. Data generated, entered, stored an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/64H04L9/32G06F21/44G06F21/57
CPCG06F21/44G06F21/51G06F21/572G06F21/575G06F21/64G06F2221/033H04L9/3242H04L9/3247
Inventor A·甘特曼D·M·雅各布森
Owner QUALCOMM INC