WO2005006109A3 - System and method for authenticating software using hidden intermediate keys - Google Patents
System and method for authenticating software using hidden intermediate keys Download PDFInfo
- Publication number
- WO2005006109A3 WO2005006109A3 PCT/US2003/039809 US0339809W WO2005006109A3 WO 2005006109 A3 WO2005006109 A3 WO 2005006109A3 US 0339809 W US0339809 W US 0339809W WO 2005006109 A3 WO2005006109 A3 WO 2005006109A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- loader
- value
- hashing algorithm
- software
- prefix
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2525376A CA2525376C (en) | 2003-06-19 | 2003-12-15 | System and method for authenticating software using hidden intermediate keys |
EP03817468A EP1636715A4 (en) | 2003-06-19 | 2003-12-15 | System and method for authenticating software using hidden intermediate keys |
AU2003300926A AU2003300926A1 (en) | 2003-06-19 | 2003-12-15 | System and method for authenticating software using hidden intermediate keys |
IL172519A IL172519A0 (en) | 2003-06-19 | 2005-12-12 | System and method for authenticating software using hidden intermediate keys |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/464,884 | 2003-06-19 | ||
US10/464,884 US6961852B2 (en) | 2003-06-19 | 2003-06-19 | System and method for authenticating software using hidden intermediate keys |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2005006109A2 WO2005006109A2 (en) | 2005-01-20 |
WO2005006109A3 true WO2005006109A3 (en) | 2005-03-03 |
WO2005006109A8 WO2005006109A8 (en) | 2005-09-29 |
Family
ID=33563711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2003/039809 WO2005006109A2 (en) | 2003-06-19 | 2003-12-15 | System and method for authenticating software using hidden intermediate keys |
Country Status (9)
Country | Link |
---|---|
US (1) | US6961852B2 (en) |
EP (1) | EP1636715A4 (en) |
KR (2) | KR100896625B1 (en) |
CN (1) | CN100424678C (en) |
AU (1) | AU2003300926A1 (en) |
CA (1) | CA2525376C (en) |
IL (1) | IL172519A0 (en) |
TW (1) | TWI315627B (en) |
WO (1) | WO2005006109A2 (en) |
Families Citing this family (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2381090B (en) * | 2001-10-17 | 2005-02-02 | Bitarts Ltd | Software loading |
US7475254B2 (en) * | 2003-06-19 | 2009-01-06 | International Business Machines Corporation | Method for authenticating software using protected master key |
US7591021B2 (en) * | 2003-09-05 | 2009-09-15 | Microsoft Corporation | Object model document for obfuscating object model therein |
US7831838B2 (en) * | 2004-03-05 | 2010-11-09 | Microsoft Corporation | Portion-level in-memory module authentication |
US7266661B2 (en) * | 2004-05-27 | 2007-09-04 | Silverbrook Research Pty Ltd | Method of storing bit-pattern in plural devices |
US20060143454A1 (en) * | 2004-05-27 | 2006-06-29 | Silverbrook Research Pty Ltd | Storage of multiple keys in memory |
US7243193B2 (en) * | 2004-05-27 | 2007-07-10 | Silverbrook Research Pty Ltd | Storage of program code in arbitrary locations in memory |
US20060020810A1 (en) * | 2004-07-24 | 2006-01-26 | International Business Machines Corporation | System and method for software load authentication |
US7490245B2 (en) * | 2004-07-24 | 2009-02-10 | Lenovo (Singapore) Pte. Ltd. | System and method for data processing system planar authentication |
US7644287B2 (en) * | 2004-07-29 | 2010-01-05 | Microsoft Corporation | Portion-level in-memory module authentication |
JP2006050504A (en) * | 2004-08-09 | 2006-02-16 | Canon Inc | Image processing device and method thereof |
US7779269B2 (en) * | 2004-09-21 | 2010-08-17 | Ciena Corporation | Technique for preventing illegal invocation of software programs |
US7577848B2 (en) * | 2005-01-18 | 2009-08-18 | Microsoft Corporation | Systems and methods for validating executable file integrity using partial image hashes |
US7509250B2 (en) * | 2005-04-20 | 2009-03-24 | Honeywell International Inc. | Hardware key control of debug interface |
KR20130095855A (en) * | 2005-05-11 | 2013-08-28 | 퀄컴 인코포레이티드 | Distributed processing system and method |
US8839450B2 (en) * | 2007-08-02 | 2014-09-16 | Intel Corporation | Secure vault service for software components within an execution environment |
US7669242B2 (en) * | 2005-06-30 | 2010-02-23 | Intel Corporation | Agent presence monitor configured to execute in a secure environment |
US7953980B2 (en) | 2005-06-30 | 2011-05-31 | Intel Corporation | Signed manifest for run-time verification of software program identity and integrity |
US8438647B2 (en) * | 2005-07-14 | 2013-05-07 | Imation Corp. | Recovery of encrypted data from a secure storage device |
US8015606B1 (en) | 2005-07-14 | 2011-09-06 | Ironkey, Inc. | Storage device with website trust indication |
US8335920B2 (en) * | 2005-07-14 | 2012-12-18 | Imation Corp. | Recovery of data access for a locked secure storage device |
US8321953B2 (en) * | 2005-07-14 | 2012-11-27 | Imation Corp. | Secure storage device with offline code entry |
US7814330B2 (en) * | 2005-08-01 | 2010-10-12 | Oracle International Corporation | Method and apparatus for facilitating multi-level computer system authentication |
US20070067620A1 (en) * | 2005-09-06 | 2007-03-22 | Ironkey, Inc. | Systems and methods for third-party authentication |
US20070060373A1 (en) * | 2005-09-12 | 2007-03-15 | Bigfoot Networks, Inc. | Data communication system and methods |
US9455844B2 (en) * | 2005-09-30 | 2016-09-27 | Qualcomm Incorporated | Distributed processing system and method |
US7389426B2 (en) | 2005-11-29 | 2008-06-17 | Research In Motion Limited | Mobile software terminal identifier |
US8639873B1 (en) | 2005-12-22 | 2014-01-28 | Imation Corp. | Detachable storage device with RAM cache |
US8266378B1 (en) | 2005-12-22 | 2012-09-11 | Imation Corp. | Storage device with accessible partitions |
US20070162733A1 (en) * | 2006-01-06 | 2007-07-12 | Dell Products L.P. | Secure CMOS |
US8370928B1 (en) * | 2006-01-26 | 2013-02-05 | Mcafee, Inc. | System, method and computer program product for behavioral partitioning of a network to detect undesirable nodes |
US8438658B2 (en) * | 2006-02-02 | 2013-05-07 | International Business Machines Corporation | Providing sealed storage in a data processing device |
KR20070082405A (en) * | 2006-02-16 | 2007-08-21 | 삼성전자주식회사 | Encrypted data player and encrypted data play system |
US20070300031A1 (en) * | 2006-06-22 | 2007-12-27 | Ironkey, Inc. | Memory data shredder |
EP2047373A4 (en) * | 2006-07-17 | 2017-03-29 | Qualcomm Incorporated | Host posing network device and method thereof |
US8874780B2 (en) * | 2006-07-17 | 2014-10-28 | Qualcomm Incorporated | Data buffering and notification system and methods thereof |
US7802050B2 (en) * | 2006-09-29 | 2010-09-21 | Intel Corporation | Monitoring a target agent execution pattern on a VT-enabled system |
US7882318B2 (en) * | 2006-09-29 | 2011-02-01 | Intel Corporation | Tamper protection of software agents operating in a vitual technology environment methods and apparatuses |
US20080107275A1 (en) * | 2006-11-08 | 2008-05-08 | Mehdi Asnaashari | Method and system for encryption of information stored in an external nonvolatile memory |
US7908364B2 (en) * | 2007-01-26 | 2011-03-15 | Bigfoot Networks, Inc. | Method storing socket state information in application space for improving communication efficiency of an application program |
US8001383B2 (en) * | 2007-02-01 | 2011-08-16 | Microsoft Corporation | Secure serial number |
US20080222733A1 (en) * | 2007-03-08 | 2008-09-11 | Ddtic Corporation, Ltd. | Anti-pirate memory card |
WO2008118522A1 (en) * | 2007-03-23 | 2008-10-02 | Bigfoot Networks, Inc. | Distributed processing system and method |
WO2008118807A1 (en) * | 2007-03-26 | 2008-10-02 | Bigfoot Networks, Inc. | Method and system for communication between nodes |
KR101427646B1 (en) * | 2007-05-14 | 2014-09-23 | 삼성전자주식회사 | Method and apparatus for checking integrity of firmware |
EP2181393A4 (en) * | 2007-07-20 | 2013-08-21 | Qualcomm Inc | Client authentication device and methods thereof |
EP2176755A4 (en) | 2007-07-20 | 2013-01-23 | Qualcomm Atheros Inc | Remote access diagnostic device and methods thereof |
US8099718B2 (en) * | 2007-11-13 | 2012-01-17 | Intel Corporation | Method and system for whitelisting software components |
JP2009130882A (en) * | 2007-11-28 | 2009-06-11 | Oki Electric Ind Co Ltd | Check value confirming method and apparatus |
KR101561716B1 (en) * | 2007-11-29 | 2015-10-19 | 퀄컴 인코포레이티드 | Remote message routing device and methods thereof |
US8719585B2 (en) * | 2008-02-11 | 2014-05-06 | Nvidia Corporation | Secure update of boot image without knowledge of secure key |
JP4998314B2 (en) * | 2008-02-19 | 2012-08-15 | コニカミノルタホールディングス株式会社 | Communication control method and communication control program |
WO2009137371A2 (en) * | 2008-05-02 | 2009-11-12 | Ironkey, Inc. | Enterprise device recovery |
WO2009158538A1 (en) * | 2008-06-27 | 2009-12-30 | Wms Gaming, Inc. | Authenticating components in wagering game systems |
US8255692B2 (en) * | 2008-07-11 | 2012-08-28 | Rosemount Inc. | Method of providing secure tamper-proof acquired data from process instruments |
US8364601B2 (en) * | 2008-12-31 | 2013-01-29 | Intel Corporation | Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain |
EP2401866A4 (en) * | 2009-02-24 | 2012-10-24 | Beyond Broadband Technology Llc | Cable television secure communication system for one way restricted access |
US8745365B2 (en) | 2009-08-06 | 2014-06-03 | Imation Corp. | Method and system for secure booting a computer by booting a first operating system from a secure peripheral device and launching a second operating system stored a secure area in the secure peripheral device on the first operating system |
US8683088B2 (en) * | 2009-08-06 | 2014-03-25 | Imation Corp. | Peripheral device data integrity |
US8577809B2 (en) * | 2011-06-30 | 2013-11-05 | Qualcomm Incorporated | Method and apparatus for determining and utilizing value of digital assets |
CN102663325A (en) * | 2012-03-12 | 2012-09-12 | 苏州阔地网络科技有限公司 | A method and system for binding of software and hardware |
CN103237005A (en) * | 2013-03-15 | 2013-08-07 | 福建联迪商用设备有限公司 | Method and system for key management |
CN103220271A (en) * | 2013-03-15 | 2013-07-24 | 福建联迪商用设备有限公司 | Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key |
US9424443B2 (en) | 2013-08-20 | 2016-08-23 | Janus Technologies, Inc. | Method and apparatus for securing computer mass storage data |
US9992171B2 (en) * | 2014-11-03 | 2018-06-05 | Sony Corporation | Method and system for digital rights management of encrypted digital content |
EP3040896A1 (en) * | 2014-12-30 | 2016-07-06 | Gemalto Sa | Secure element |
US9697359B2 (en) * | 2015-04-15 | 2017-07-04 | Qualcomm Incorporated | Secure software authentication and verification |
KR102538096B1 (en) * | 2016-09-13 | 2023-05-31 | 삼성전자주식회사 | Device and method of verify application |
EP3509003B1 (en) * | 2018-01-04 | 2021-04-21 | Shenzhen Goodix Technology Co., Ltd. | Method and apparatus to protect code processed by an embedded micro-processor against altering |
KR102190727B1 (en) * | 2018-12-27 | 2020-12-14 | 아주대학교산학협력단 | Apparatus and method for detecting vulnerability of software |
JP7253470B2 (en) * | 2019-07-31 | 2023-04-06 | 株式会社デンソーテン | Information processing equipment |
US11782610B2 (en) * | 2020-01-30 | 2023-10-10 | Seagate Technology Llc | Write and compare only data storage |
US11528135B2 (en) | 2020-03-31 | 2022-12-13 | Taiwan Semiconductor Manufacturing Company, Ltd. | Integrated circuit (IC) signatures with random number generator and one-time programmable device |
TWI781544B (en) * | 2020-03-31 | 2022-10-21 | 台灣積體電路製造股份有限公司 | Integrated circuit device and method and system of generating a security key for an integrated circuit device |
US11962693B2 (en) | 2020-03-31 | 2024-04-16 | Taiwan Semiconductor Manufacturing Company, Ltd. | Integrated circuit (IC) signatures with random number generator and one-time programmable device |
US11416621B2 (en) * | 2020-06-18 | 2022-08-16 | Micron Technology, Inc. | Authenticating software images |
CN114553399B (en) * | 2020-11-18 | 2022-10-11 | 澜起电子科技(上海)有限公司 | Method and device for deriving chip built-in key |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4811393A (en) * | 1986-07-17 | 1989-03-07 | Bull, S.A. | Method and system for diversification of a basic key and for authentication of a thus-diversified key |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US6091819A (en) * | 1996-08-16 | 2000-07-18 | Telcordia Technologies, Inc. | Accelerating public-key cryptography by precomputing randomly generated pairs |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69724235T2 (en) * | 1997-05-28 | 2004-02-26 | Siemens Ag | Computer system and software protection method |
US6760441B1 (en) | 2000-03-31 | 2004-07-06 | Intel Corporation | Generating a key hieararchy for use in an isolated execution environment |
CN1147793C (en) * | 2001-05-30 | 2004-04-28 | 深圳市朗科科技有限公司 | Semiconductor memory device |
US6925557B2 (en) | 2001-10-26 | 2005-08-02 | International Business Machines Corporation | Method and system for a clean system booting process |
-
2003
- 2003-06-19 US US10/464,884 patent/US6961852B2/en not_active Expired - Fee Related
- 2003-12-15 KR KR1020057022399A patent/KR100896625B1/en not_active IP Right Cessation
- 2003-12-15 CA CA2525376A patent/CA2525376C/en not_active Expired - Lifetime
- 2003-12-15 CN CNB2003801094646A patent/CN100424678C/en not_active Expired - Fee Related
- 2003-12-15 EP EP03817468A patent/EP1636715A4/en not_active Ceased
- 2003-12-15 WO PCT/US2003/039809 patent/WO2005006109A2/en active Application Filing
- 2003-12-15 KR KR1020097005256A patent/KR100974161B1/en not_active IP Right Cessation
- 2003-12-15 AU AU2003300926A patent/AU2003300926A1/en not_active Abandoned
-
2004
- 2004-06-03 TW TW093115949A patent/TWI315627B/en not_active IP Right Cessation
-
2005
- 2005-12-12 IL IL172519A patent/IL172519A0/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4811393A (en) * | 1986-07-17 | 1989-03-07 | Bull, S.A. | Method and system for diversification of a basic key and for authentication of a thus-diversified key |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US6091819A (en) * | 1996-08-16 | 2000-07-18 | Telcordia Technologies, Inc. | Accelerating public-key cryptography by precomputing randomly generated pairs |
Also Published As
Publication number | Publication date |
---|---|
AU2003300926A8 (en) | 2005-01-28 |
EP1636715A4 (en) | 2009-03-25 |
TW200509636A (en) | 2005-03-01 |
CN100424678C (en) | 2008-10-08 |
IL172519A0 (en) | 2006-04-10 |
CA2525376C (en) | 2014-02-04 |
AU2003300926A1 (en) | 2005-01-28 |
WO2005006109A2 (en) | 2005-01-20 |
KR100974161B1 (en) | 2010-08-04 |
KR100896625B1 (en) | 2009-05-08 |
WO2005006109A8 (en) | 2005-09-29 |
CN1745377A (en) | 2006-03-08 |
CA2525376A1 (en) | 2005-01-20 |
EP1636715A2 (en) | 2006-03-22 |
KR20060026024A (en) | 2006-03-22 |
US6961852B2 (en) | 2005-11-01 |
TWI315627B (en) | 2009-10-01 |
KR20090045340A (en) | 2009-05-07 |
US20050010767A1 (en) | 2005-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005006109A8 (en) | System and method for authenticating software using hidden intermediate keys | |
TW200514408A (en) | System and method for authenticating software using protected master key | |
WO2007014325A3 (en) | Verifying provenance data associated with digital content | |
WO1998045980A3 (en) | Secure deterministic encryption key generator system and method | |
US8677136B2 (en) | Authenticating messages using cryptographic algorithm constants supplied to a storage-constrained target | |
GB2384593A (en) | Method and apparatus for software authentication | |
WO2009002599A3 (en) | Electronically securing an electronic device using physically unclonable functions | |
AU2002212279A1 (en) | System for protecting static and dynamic data against unauthorised manipulation | |
CA2531363A1 (en) | Method and apparatus for incremental code signing | |
WO2003088019A3 (en) | Microcode patch authentication | |
WO2002073377A3 (en) | Authorisation method for a user of a limited access system having an authorisation centre | |
WO2006069082A3 (en) | Access keys | |
WO2006082985A3 (en) | Methods and apparatus for providing a secure booting sequence in a processor | |
WO2005038641A3 (en) | Data security | |
EP1352677A3 (en) | Gaming software authentication | |
JP2006512864A5 (en) | ||
WO2002013445A3 (en) | Linking public key of device to information during manufacture | |
WO2005060151A3 (en) | Trusted mobile platform architecture | |
CA2470326A1 (en) | Gaming machine having hardware-accelerated software authentication | |
SG152289A1 (en) | System and method for application authorization | |
EP2339777A3 (en) | Method of authenticating a user to use a system | |
MY146142A (en) | Authentication of data transmitted in a digital transmission system | |
WO2007068519A3 (en) | Method and systems using radio frequency identifier tags for comparing and authenticating items | |
JP2005525662A5 (en) | ||
EP0792043A3 (en) | Method of sharing cryptokey |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 20038A94646 Country of ref document: CN |
|
CFP | Corrected version of a pamphlet front page | ||
CR1 | Correction of entry in section i |
Free format text: IN PCT GAZETTE 03/2005 UNDER (71) REPLACE "NJ" BY "NY" |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2525376 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003300926 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020057022399 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 172519 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003817468 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 239/CHENP/2006 Country of ref document: IN |
|
WWP | Wipo information: published in national office |
Ref document number: 2003817468 Country of ref document: EP Ref document number: 1020057022399 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: JP |