ASSOCIATING SOFTWARE WITH HARDWARE USING CRYPTOGRAPHY
Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software I...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English French |
Published |
28.10.2004
|
Edition | 7 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Techniques for associating software with hardware using cryptography are described. The software is identified by a software identifier (ID), and the hardware is identified by a hardware ID. The software is hashed to obtain a code digest. A code signature is generated for the code digest, software ID, and hardware ID. A code image is formed with the software, software ID, code signature, and a certificate. The certificate contains cryptographic information used to authenticate the certificate and validate the code signature. The code image is loaded onto a device. The device validates the software to hardware association prior to executing the software. For the validation, the device authenticates the certificate with a certificate authority public key embedded within the device. The device also validates t he code signature using the cryptographic information contained in the certificate, information in the code image, and the hardware ID embedded within the device. |
---|---|
Bibliography: | Application Number: CA20042521821 |