Check patentability & draft patents in minutes with Patsnap Eureka AI!

Safe Software Certification and Validation

A software, non-secure technology that can be used in secure communication devices, digital data authentication, computer security devices, etc., and can solve problems such as low power processing capabilities/resource difficulties

Inactive Publication Date: 2018-11-23
QUALCOMM INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, authentication using public keys is processing intensive and difficult for many devices that are low power or have very little processing power / resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe Software Certification and Validation
  • Safe Software Certification and Validation
  • Safe Software Certification and Validation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In the following description, specific details are given to provide a thorough understanding of the described embodiments. However, it will be understood by those skilled in the art that the described embodiments may be practiced without such specific details. For example, circuits may be shown in block diagrams in order not to obscure the implementations in unnecessary detail. In other instances, well-known circuits, structures and techniques have been shown in detail so as not to obscure the implementations.

[0025] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any implementation or example described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other examples or implementations. Likewise, the term "embodiments" does not require that all embodiments include the discussed feature, advantage or mode of operation.

[0026] review

[0027] One feature provides secure loadin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The software stored in the non-secure storage device is authenticated when the software is first loaded for execution by the device. Authenticating the software may involve a cryptographic operation of the software and a digital signature of the software. If authentication of the software is successful, an authentication tag for the software can be generated, the authentication tag being based on the software and at least device specific secret data. The authentication tag may be stored within the device. Then whenever the software is loaded for execution, the software can be verified (not certified) by using the verification tag to confirm that the software being loaded is the same software that was used to generate the verification tag , while avoiding authentication of the software.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to and benefit from non-provisional application Ser. No. 14 / 687,783, filed April 15, 2015, in the United States Patent and Trademark Office, which is hereby incorporated by reference in its entirety. technical field [0003] Various features disclosed herein relate generally to authentication of software to reduce hacking of software in devices lacking secure storage, and more particularly to a method of performing software authentication when the software is first executed and thereafter. A more efficient approach to software verification. Background technique [0004] such as a mobile phone, nomadic device, pager, wireless modem, personal digital assistant, tablet computer, personal information manager (PIM), personal media player, palmtop computer, laptop computer, or any other device with a processor Devices are becoming more popular and ubiquitous. Data generated, entered, store...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51G06F21/64H04L9/32G06F21/44G06F21/57
CPCG06F21/44G06F21/51G06F21/572G06F21/575G06F21/64G06F2221/033H04L9/3242H04L9/3247
Inventor A·甘特曼D·M·雅各布森
Owner QUALCOMM INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More