IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0615843
(2009-11-10)
|
등록번호 |
US-8438392
(2013-05-07)
|
발명자
/ 주소 |
|
출원인 / 주소 |
- Krimmeni Technologies, Inc.
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
8 인용 특허 :
20 |
초록
▼
Embodiments of systems and methods which provide highly specific control over the execution of general-purpose code block are disclosed. These embodiments may allow the exact circumstances under which a given code block is allowed to execute to be determined with specificity. Such a control mechanis
Embodiments of systems and methods which provide highly specific control over the execution of general-purpose code block are disclosed. These embodiments may allow the exact circumstances under which a given code block is allowed to execute to be determined with specificity. Such a control mechanism may be coupled with embodiments of a data hiding system and method, based for example, on an ordered execution of a set of code segments implemented via recursive execution. When embodiments of these systems and methods are utilized together an unencumbered generality as well as a level of protection against attack that surpasses many other security systems may be obtained.
대표청구항
▼
1. A method for controlling the execution of code on an endpoint device comprising: receiving a first bitstream at a device;obtaining a first key corresponding to the first bitstream, wherein the first key was created by hashing the first bitstream and encrypting the hashed first bitstream;authentic
1. A method for controlling the execution of code on an endpoint device comprising: receiving a first bitstream at a device;obtaining a first key corresponding to the first bitstream, wherein the first key was created by hashing the first bitstream and encrypting the hashed first bitstream;authenticating the first bitstream using hardware at the device operable to access a first secret key specific to the device which is stored in the hardware of the device and is accessible when the device is executing in secured mode, wherein authenticating the first bitstream comprises: hashing the first bitstream,generating a second key by encrypting the hashed first bitstream, wherein the encryption of the hashed first bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of the access in the encryption, andcomparing the generated second key with the first key;if the second key and the first key match, executing the first bitstream on the processor in secured mode, wherein the first bitstream comprises a first encryption engine, and executing the first bitstream comprises decrypting encrypted digital content associated with the first bitstream using the first encryption engine and the first secret key specific to the device and the execution of the first bitstream is done in secured mode; andif the second key and the first key do not match, determining if the first bitstream is encrypted, and if the first bitstream is encrypted: obtaining a second bitstream;authenticating the second bitstream using the hardware at the device operable to access the first secret key specific to the device which is stored in the hardware, wherein authenticating the second bitstream comprises: obtaining a third key corresponding to the second bitstream, wherein the third key was created by hashing the second bitstream and encrypting the hashed second bitstream,hashing the second bitstream, wherein the hashing of the second bitstream utilizes the second key generated from the first bitstream as a seed value,generating a fourth key by encrypting the hashed second bitstream, wherein the encryption of the hashed second bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of this access in the encryption,comparing the generated fourth key with the third key, andif the fourth key and the third key match, executing the second bitstream on the processor in secured mode. 2. The method of claim 1, wherein the authentication of the second bitstream and execution of the second bitstream is done before the execution of the first bitstream. 3. The method of claim 2, further comprising authenticating the first bitstream after the execution of the second bitstream and before the execution of the first bitstream. 4. A method for controlling the execution of code on an endpoint device comprising: receiving a first bitstream at a device;obtaining a first key corresponding to the first bitstream wherein the first key was created by hashing the first bitstream and encrypting the hashed first bitstream;authenticating the first bitstream using hardware at the device operable to access a first secret key specific to the device which is stored in the hardware of the device and is accessible when the device is executing in secured mode, wherein authenticating the first bitstream comprises: hashing the first bitstream,generating a second key by encrypting the hashed first bitstream, wherein the encryption of the hashed first bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of the access in the encryption, andcomparing the generated second key with the first key;if the second key and the first key match, executing the first bitstream on the processor in secured mode, wherein the first bitstream comprises a first encryption engine, and executing the first bitstream comprises decrypting encrypted digital content associated with the first bitstream using the first encryption engine and the first secret key specific to the device and the execution of the first bitstream is done in secured mode; andif the second key and the first key do not match, determining if the first bitstream is encrypted, and if the first bitstream is encrypted: obtaining a second bitstream, wherein the second bitstream comprises a second encryption engine;authenticating the second bitstream using the hardware at the device operable to access the first secret key specific to the device which is stored in the hardware, wherein authenticating the second bitstream comprises: obtaining a third key corresponding to the second bitstream, wherein the third key was created by hashing the second bitstream and encrypting the hashed second bitstream,hashing the second bitstream,generating a fourth key by encrypting the hashed second bitstream, wherein the encryption of the hashed second bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of this access in the encryption,comparing the generated fourth key with the third key, andif the fourth key and the third key match, executing the second bitstream on the processor in secured mode wherein executing the second bitstream comprises decrypting both the first bitstream and the encrypted digital content with the second encryption engine using the first secret key specific to the device. 5. The method of claim 4, wherein the authentication of the second bitstream and execution of the second bitstream is done before the execution of the first bitstream. 6. The method of claim 5, further comprising authenticating the first bitstream after the execution of the second bitstream and before the execution of the first bitstream. 7. The method of claim 6, wherein the first bitstream, second bitstream, encrypted digital content, first key and third key were received in a message, the message generated by: encrypting the digital content with the first encryption engine of the first bitstream;generating the first key by hashing the first bitstream and encrypting the hashed first bitstream with the first secret key specific to the device;associating the first key, first bitstream and encrypted digital content;encrypting the associated the first key, first bitstream and encrypted digital content with the second encryption engine of the second bitstream;generating the third key by hashing the second bitstream and encrypting the hashed second bitstream with the first secret key specific to the device;associating the first decryption algorithm with the first encrypted bitstream; andassociating the third key, second bitstream and encrypted associated first key, first bitstream and encrypted digital content. 8. A system for controlling the execution of code, comprising: a device, comprising:a processor;first hardware for storing a first secret key;second hardware operable to: access the first secret key when the processor is executing in secured mode, and implement an encryption algorithm using the first secret keya computer readable storage media comprising instructions executable by the processor for:receiving a first bitstream at the device wherein the first bitstream comprises a first encryption engine;obtaining a first key corresponding to the first bitstream, wherein the first key was created by hashing the first bitstream and encrypting the hashed first bitstream;authenticating the first bitstream using the second hardware at the device wherein authenticating the first bitstream comprises: hashing the first bitstream,generating a second key by encrypting the hashed first bitstream, wherein the encryption of the hashed first bitstream is done in the second hardware of the device and the second hardware attempts to access the first secret key specific to the device and uses the result of the access in the encryption, andcomparing the generated second key with the first key;if the second key and the first key match, executing the first bitstream on the processor in secured mode wherein executing the first bitstream comprises decrypting encrypted digital content associated with the first bitstream using the first encryption engine and the first secret key specific to the device and the execution of the first bitstream is done in secured mode;determining if the first bitstream is encrypted and if the first bitstream is encrypted: obtaining a second bitstream;authenticating the second bitstream using the second hardware at the device operable to access the first secret key specific to the device which is stored in the first hardware, wherein authenticating the second bitstream comprises: obtaining a third key corresponding to the second bitstream, wherein the third key was created by hashing the second bitstream and encrypting the hashed second bitstream,hashing the second bitstream, wherein the hashing of the second bitstream utilizes the second key generated from the first bitstream as a seed value,generating a fourth key by encrypting the hashed second bitstream, wherein the encryption of the hashed second bitstream is done in the second hardware of the device and the second hardware attempts to access the first secret key specific to the device and uses the result of this access in the encryption,comparing the generated fourth key with the third key; andif the fourth key and the third key match, executing the second bitstream on the processor in secured mode. 9. The system of claim 8, wherein the authentication of the second bitstream and execution of the second bitstream is done before the execution of the first bitstream. 10. The system of claim 9, wherein the instructions are operable for authenticating the first bitstream after the execution of the second bitstream and before the execution of the first bitstream. 11. A system for controlling the execution of code, comprising: a device, comprising:a processor;first hardware for storing a first secret key;second hardware operable to: access the first secret key when the processor is executing in secured mode, and implement an encryption algorithm using the first secret keya computer readable storage media comprising instructions executable by the processor for:receiving a first bitstream at the device, wherein the first bitstream comprises a first encryption engine;obtaining a first key corresponding to the first bitstream, wherein the first key was created by hashing the first bitstream and encrypting the hashed first bitstream;authenticating the first bitstream using the second hardware at the device wherein authenticating the first bitstream comprises: hashing the first bitstream,generating a second key by encrypting the hashed first bitstream, wherein the encryption of the hashed first bitstream is done in the second hardware of the device and the second hardware attempts to access the first secret key specific to the device and uses the result of the access in the encryption, andcomparing the generated second key with the first key;if the second key and the first key match, executing the first bitstream on the processor in secured mode wherein executing the first bitstream comprises decrypting encrypted digital content associated with the first bitstream using the first encryption engine and the first secret key specific to the device and the execution of the first bitstream is done in secured mode;determining if the first bitstream is encrypted and if the first bitstream is encrypted: obtaining a second bitstream, wherein the second bitstream comprises a second encryption engine,authenticating the second bitstream using the second hardware at the device operable to access the first secret key specific to the device which is stored in the first hardware, wherein authenticating the second bitstream comprises: obtaining a third key corresponding to the second bitstream, wherein the third key was created by hashing the second bitstream and encrypting the hashed second bitstream,hashing the second bitstream,generating a fourth key by encrypting the hashed second bitstream, wherein the encryption of the hashed second bitstream is done in the second hardware of the device and the second hardware attempts to access the first secret key specific to the device and uses the result of this access in the encryption,comparing the generated fourth key with the third key; andif the fourth key and the third key match, executing the second bitstream on the processor in secured mode wherein executing the second bitstream comprises decrypting both the first bitstream and the encrypted digital content with the second encryption engine using the first secret key specific to the device. 12. The system of claim 11, wherein the authentication of the second bitstream and execution of the second bitstream is done before the execution of the first bitstream. 13. The system of claim 12, wherein the instructions are operable for authenticating the first bitstream after the execution of the second bitstream and before the execution of the first bitstream. 14. The system of claim 13, wherein the first bitstream, second bitstream, encrypted digital content, first key and third key were received in a message, the message generated by: encrypting the digital content with the first encryption engine of the first bitstream;generating the first key by hashing the first bitstream and encrypting the hashed first bitstream with the first secret key specific to the device;associating the first key, first bitstream and encrypted digital content;encrypting the associated the first key, first bitstream and encrypted digital content with the second encryption engine of the second bitstream;generating the third key by hashing the second bitstream and encrypting the hashed second bitstream with the first secret key specific to the device;associating the first decryption algorithm with the first encrypted bitstream; andassociating the third key, second bitstream and encrypted associated first key, first bitstream and encrypted digital content. 15. A non-transitory computer readable media, comprising instructions executable by a processor for controlling the execution of code on an endpoint device, including instructions executable for: receiving a first bitstream at a device;obtaining a first key corresponding to the first bitstream, wherein the first key was created by hashing the first bitstream and encrypting the hashed first bitstream;authenticating the first bitstream using hardware at the device operable to access a first secret key specific to the device which is stored in the hardware of the device and is accessible when the device is executing in secured mode, wherein authenticating the first bitstream comprises: hashing the first bitstream,generating a second key by encrypting the hashed first bitstream, wherein the encryption of the hashed first bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of the access in the encryption, andcomparing the generated second key with the first key;if the second key and the first key match, executing the first bitstream on the processor in secured mode, wherein the first bitstream comprises a first encryption engine, and executing the first bitstream comprises decrypting encrypted digital content associated with the first bitstream using the first encryption engine and the first secret key specific to the device and the execution of the first bitstream is done in secured mode; andif the second key and the first key do not match, determining if the first bitstream is encrypted, and if the first bitstream is encrypted: obtaining a second bitstream;authenticating the second bitstream using the hardware at the device operable to access the first secret key specific to the device which is stored in the hardware wherein authenticating the second bitstream comprises: obtaining a third key corresponding to the second bitstream, wherein the third key was created by hashing the second bitstream and encrypting the hashed second bitstream,hashing the second bitstream, wherein the hashing of the second bitstream utilizes the second key generated from the first bitstream as a seed value,generating a fourth key by encrypting the hashed second bitstream, wherein the encryption of the hashed second bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of this access in the encryption,comparing the generated fourth key with the third key, andif the fourth key and the third key match, executing the second bitstream on the processor in secured mode. 16. The non-transitory computer readable media of claim 15, wherein the authentication of the second bitstream and execution of the second bitstream is done before the execution of the first bitstream. 17. The non-transitory computer readable media of claim 16, further comprising authenticating the first bitstream after the execution of the second bitstream and before the execution of the first bitstream. 18. A non-transitory computer readable media, comprising instructions executable by a processor for controlling the execution of code on an endpoint device, including instructions executable for: receiving a first bitstream at a device;obtaining a first key corresponding to the first bitstream, wherein the first key was created by hashing the first bitstream and encrypting the hashed first bitstream;authenticating the first bitstream using hardware at the device operable to access a first secret key specific to the device which is stored in the hardware of the device and is accessible when the device is executing in secured mode, wherein authenticating the first bitstream comprises: hashing the first bitstream,generating a second key by encrypting the hashed first bitstream, wherein the encryption of the hashed first bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of the access in the encryption, andcomparing the generated second key with the first key;if the second key and the first key match, executing the first bitstream on the processor in secured mode, wherein the first bitstream comprises a first encryption engine, and executing the first bitstream comprises decrypting encrypted digital content associated with the first bitstream using the first encryption engine and the first secret key specific to the device and the execution of the first bitstream is done in secured mode; andif the second key and the first key do not match, determining if the first bitstream is encrypted, and if the first bitstream is encrypted: obtaining a second bitstream, wherein the second bitstream comprises a second encryption engine;authenticating the second bitstream using the hardware at the device operable to access the first secret key specific to the device which is stored in the hardware, wherein authenticating the second bitstream comprises: obtaining a third key corresponding to the second bitstream, wherein the third key was created by hashing the second bitstream and encrypting the hashed second bitstream,hashing the second bitstream,generating a fourth key by encrypting the hashed second bitstream, wherein the encryption of the hashed second bitstream is done in the hardware of the device and the hardware attempts to access the first secret key specific to the device and uses the result of this access in the encryption,comparing the generated fourth key with the third key, andif the fourth key and the third key match, executing the second bitstream on the processor in secured mode wherein executing the second bitstream comprises decrypting both the first bitstream and the encrypted digital content with the second encryption engine using the first secret key specific to the device. 19. The non-transitory computer readable media of claim 18, wherein the authentication of the second bitstream and execution of the second bitstream is done before the execution of the first bitstream. 20. The non-transitory computer readable media of claim 19, further comprising authenticating the first bitstream after the execution of the second bitstream and before the execution of the first bitstream. 21. The non-transitory computer readable media of claim 20, wherein the first bitstream, second bitstream, encrypted digital content, first key and third key were received in a message, the message generated by: encrypting the digital content with the first encryption engine of the first bitstream;generating the first key by hashing the first bitstream and encrypting the hashed first bitstream with the first secret key specific to the device;associating the first key, first bitstream and encrypted digital content;encrypting the associated the first key, first bitstream and encrypted digital content with the second encryption engine of the second bitstream;generating the third key by hashing the second bitstream and encrypting the hashed second bitstream with the first secret key specific to the device;associating the first decryption algorithm with the first encrypted bitstream; andassociating the third key, second bitstream and encrypted associated first key, first bitstream and encrypted digital content.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.