Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for authentication of software

A technology of software and software mirroring, applied in the field of certified devices, non-transitory computer-readable media, and systems, and can solve the problems of manufacturing, operation, expansion and cost overhead.

Pending Publication Date: 2021-07-09
SAMSUNG ELECTRONICS CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although various types of system security techniques can be employed to protect a system or data stored in a system from advanced attacks, system security techniques can impose overhead on the manufacture, operation, expansion, and cost of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authentication of software
  • System and method for authentication of software
  • System and method for authentication of software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] figure 1 is a block diagram of an example of a system (eg, a system for authentication of software) 10 in accordance with at least one example embodiment. In some example embodiments, non-limiting examples of system 10 may include stationary computing systems (eg, servers, desktop computers, and / or kiosks, etc.) or subsystems thereof. In some example embodiments, non-limiting examples of system 10 may include portable computing systems (e.g., mobile phones, wearable devices, smart devices, game consoles, tablet and / or laptop computers, etc.) and subsystems thereof . In some example embodiments, non-limiting examples of system 10 may include subsystems included in any system other than a stand-alone computing system, such as home appliances, Internet of Things (IoT) devices, industrial equipment, and / or transportation vehicles, etc.).

[0024] refer to figure 1 , system 10 may include at least one processor 12, system memory 14, and / or system storage 16, etc., but ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for authentication of software are provided. The system includes processing circuitry and a system memory configured to store at least one software image. The at least one software image includes at least one program image and a keychain image associated with the at least one software image, the keychain image including at least one soft key. The processing circuitry is configured to obtain a desired soft key associated with the at least one software image from the keychain image based on key information included in the at least one software image, and authenticate the at least one software image based on the obtained soft key.

Description

[0001] This application claims the benefit of priority from Korean Patent Application No. 10-2020-0002691 filed in the Korean Intellectual Property Office on January 8, 2020, the disclosure of which is hereby incorporated by reference in its entirety. technical field [0002] Various example embodiments of inventive concepts relate to system security, and more particularly, to an apparatus, system, non-transitory computer readable medium, and / or method for authentication of software. Background technique [0003] Attacks on systems, including software and hardware, can be attempted in various ways. For example, an attacker can disassemble a system and extract desired information from the disassembled system. Additionally, an attacker may alter at least a portion of the system's software and enable the system to perform the attacker's intended operations. Although various types of system security techniques may be employed to protect a system or data stored in a system from ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44H04L9/08H04L9/32
CPCG06F21/44H04L9/3247H04L9/0863H04L2209/60H04L9/50G06F21/33H04L9/14
Inventor 朴根荣
Owner SAMSUNG ELECTRONICS CO LTD