ASSOCIATING SOFTWARE WITH HARDWARE USING CRYPTOGRAPHY

Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software I...

Full description

Saved in:
Bibliographic Details
Main Authors MICHAELIS, OLIVER, MAURO, ANTHONY
Format Patent
LanguageEnglish
French
Published 28.10.2004
Edition7
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software ID, and hardware ID. A code image is formed with the software, software ID, code signature, and a certificate. The certificate contains cryptographic information used to authenticate the certificate and validate the code signature. The code image is loaded onto a device. The device validates the software to hardware association prior to executing the software. For the validation, the device authenticates the certificate with a certificate authority public key embedded within the device. The device also validates t he code signature using the cryptographic information contained in the certificate, information in the code image, and the hardware ID embedded within the device.
Bibliography:Application Number: CA20042521821