Invention Grant
US08225110B2 Cryptographic protection of usage restrictions in electronic devices 有权
电子设备使用限制的密码保护

Cryptographic protection of usage restrictions in electronic devices
Abstract:
An electronic device requires valid control keys to change any usage restriction setting. The device is provided control keys, a secret key, and a signed software object including a batch ID and a hash of the secret key. For each control key, the device generates a cryptographic footprint bound to the device and the secret key. A message authentication code (MAC) of each usage restriction setting is generated, the MAC bound to the device and a control key. To change a usage restriction, the device receives a control key, validates it against the stored footprint, changes the usage restriction settings, and generates a new usage restriction setting MAC. The control key footprints are bound to the secret key, but the device retains only a hash of the secret key.
Information query
Patent Agency Ranking
0/0