최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0925072 (2001-08-06) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 37 인용 특허 : 415 |
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority--which may be a trusted independent third party--tests the load modules
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority--which may be a trusted independent third party--tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)--allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.
We claim: 1. A method including the following: at a certification authority, receiving an executable program generated by a party independent of the certification authority; at the certification authority, testing the executable program and, based on the results of the testing, generating a specifi
We claim: 1. A method including the following: at a certification authority, receiving an executable program generated by a party independent of the certification authority; at the certification authority, testing the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; at the certification authority, generating a digital certificate certifying that the executable program operates in the manner described in the specification; receiving the executable program at a user site; receiving the digital certificate at the user site; at the user site, evaluating the digital certificate to determine if the digital certificate is associated with the executable program; at the user site, evaluating the digital certificate to determine whether to execute the executable program; and at the user site, executing the executable program, the execution being dependent on the evaluation of the digital certificate, and in which the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user at the user site, with the performance of said step of evaluating the digital certificate to determine whether to execute the executable program. 2. A method including the following: at a certification authority, receiving an executable program generated by a party independent of the certification authority; at the certification authority, testing the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; at the certification authority, generating a digital certificate certifying that the executable program operates in the manner described in the specification; receiving the executable program at a user site in encrypted form; receiving the digital certificate at the user site; at the user site, evaluating the digital certificate to determine if the digital certificate is associated with the executable program; at the user site, evaluating the digital certificate to determine whether to execute the executable program; decrypting the executable program; and at the user site, executing the executable program, the execution being dependent on the evaluation of the digital certificate, and in which the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user at the user site, with the performance of said steps of (i) decrypting the executable program, and (ii) evaluating the digital certificate to determine whether to execute the executable program. 3. A method including the following: at a certification authority, receiving an executable program generated by a party independent of the certification authority; at the certification authority, testing the executable program and, based on the results of the testing, generating a specification describing the actual operation of the executable program; at the certification authority, generating a digital certificate certifying that the executable program operates in the manner described in the specification; receiving the executable program at a user site; receiving the digital certificate at the user site; at the user site, evaluating the digital certificate to determine if the digital certificate is associated with the executable program; at the user site, evaluating the digital certificate to determine whether to execute the executable program; and at the user site, executing the executable program, the execution being dependent on the evaluation of the digital certificate, and in which the user site includes a tamper-resistant execution space, the tamper-resistant execution space being operable to protect against tampering, by a user at the user site, with the performance of said step of evaluating the digital certificate to determine whether to execute the executable program, and in which the tamper-resistant execution space includes a secure processing unit.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.