Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Apparatus and method for authenticating flash program

一种程序、闪存的技术,应用在下载到闪存的程序领域,能够解决安全漏洞等问题,达到增进有效性、减少安全漏洞的效果

Inactive Publication Date: 2012-08-22
MEDIATEK INC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem in the prior art that only using the hardware unique key to authenticate the program downloaded to the flash memory leads to security breaches, the present invention provides a device and method for authenticating the program downloaded to the flash memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for authenticating flash program
  • Apparatus and method for authenticating flash program
  • Apparatus and method for authenticating flash program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Certain terms are used throughout the description and claims to refer to particular components. Those of ordinary skill in the art will appreciate that manufacturers may refer to the same component by different terms. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a basis for distinction. "Includes" mentioned throughout the specification and claims is an open term, so it should be interpreted as "including but not limited to". In addition, the term "coupled" herein includes any direct and indirect means of electrical connection. Therefore, if it is described that the first device is coupled to the second device, it means that the first device may be directly electrically connected to the second device, or indirectly electrically connected to the second device through other devices or connection means.

[0020] figure 1 A block diagram of the encryption system. Pla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In one embodiment of the invention, an apparatus for authenticating a flash program is provided. The apparatus comprises a hardware unique key, a register storing a customer identity (ID) and a message authentication code (MAC) generation unit. The MAC generation unit acquires a root key corresponding to the hardware unique key an the customer ID, and generates a MAC for the flash program using the acquired root key, wherein the content of the register is locked to avoid modification of the stored customer ID until the next system reset.

Description

technical field [0001] The present invention relates to the program downloaded to the flash memory, in particular to the device and method for authenticating the program downloaded to the flash memory. Background technique [0002] One form of security mechanism uses a hardware unique key loaded into the chip. Therefore, in various applications, a hardware unique key is loaded onto the chip to meet the cryptographic requirements of confidentiality, integrity and authenticity. As such, the hardware unique key is unique to each chip. That is, if the hardware unique key is loaded into the chip, the value of the hardware unique key cannot be changed. Another advantage of using a hardware unique key is that the hardware unique key cannot be read externally. Therefore, hardware unique keys are widely used as a security mechanism. Usually, the initial information transmitted to the chip is encrypted by a hardware unique key, and the output encrypted information cannot be read d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/00
CPCG06F21/572G06F21/64G06F2221/2117H04L9/3242H04L2209/60
Inventor 杨庆昭杨宗宪
Owner MEDIATEK INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products