SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS
    1.
    发明公开
    SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS 审中-公开
    系统和方法用于验证软件使用隐藏的中间密钥

    公开(公告)号:EP1636715A4

    公开(公告)日:2009-03-25

    申请号:EP03817468

    申请日:2003-12-15

    Applicant: IBM

    Inventor: CRAFT DAVID J

    CPC classification number: G06F21/123

    Abstract: A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.

    ENCODING METHOD AND DATA COMPRESSOR

    公开(公告)号:JPH11145849A

    公开(公告)日:1999-05-28

    申请号:JP22959298

    申请日:1998-08-14

    Applicant: IBM

    Inventor: CRAFT DAVID J

    Abstract: PROBLEM TO BE SOLVED: To provide a method and a device improved for compressing data. SOLUTION: A method is disclosed for encoding the input data stream of a primary symbol and generating the output sequence of a pointer. A literal string in the input data stream is first loaded into a history buffer. The value of a history buffer pointer is copied to a register, and the starting position of the literal string in the history buffer is shown. A counter is incremented, corresponding to each following literal symbol from the input data stream. Next, the literal string and each following literal symbol from the input data stream are encoded by using values in the register and the counter as literal pointers. Finally, the literal pointer is outputted from a data compressor.

    SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS
    3.
    发明申请
    SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS 审中-公开
    使用隐藏中间码来验证软件的系统和方法

    公开(公告)号:WO2005006109A3

    公开(公告)日:2005-03-03

    申请号:PCT/US0339809

    申请日:2003-12-15

    Applicant: IBM

    Inventor: CRAFT DAVID J

    CPC classification number: G06F21/123

    Abstract: A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.

    Abstract translation: 处理单元(300)包括只读加密密钥(394)。 装载器代码图像(250)从非易失性存储器(270)装载到系统存储器(205)中。 装载器代码图像(250)包括前缀值(225)和后缀值(235)。 前缀值(225)与来自处理单元(300)的主密钥(394)组合,以创建作为散列算法的种子的随机值。 散列算法使用具有由代码块形成的签名的种子值来形成结果。 在散列算法期间,生成中间密钥值并存储在用户无法访问的存储区域中。 中间密钥值由加载程序代码在加载程序进行身份验证和加载后使用。 加载器将一个或多个中间密钥值与对应于其他软件模块的前缀和后缀值组合以使用散列算法进行认证,并在认证时加载软件。

    DATA COMPRESSING METHOD PROVIDED WITH EXCELLENT DATA MAINTAINABILITY AND SYSTEM THEREFOR

    公开(公告)号:JPH10320224A

    公开(公告)日:1998-12-04

    申请号:JP9787298

    申请日:1998-04-09

    Applicant: IBM

    Inventor: CRAFT DAVID J

    Abstract: PROBLEM TO BE SOLVED: To provide a system capable of giving high maintainability at the time of compressing data. SOLUTION: The system includes interfaces 102, 112, compression/ decompression units 104, 114 and a storage means 120. Each compression/ decompression units compresses/decompresses data sent through its corresponding interface and supplies a data stream. The compression/decompression units 104, 114 mutually monitor respective data streams through an interface 116. When one compression/decompression unit is a master device, the other compression/decompression units compares one data stream with the other.

    SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS
    6.
    发明申请
    SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS 审中-公开
    用于使用隐藏的中间密钥来认证软件的系统和方法

    公开(公告)号:WO2005006109A8

    公开(公告)日:2005-09-29

    申请号:PCT/US0339809

    申请日:2003-12-15

    Applicant: IBM

    Inventor: CRAFT DAVID J

    CPC classification number: G06F21/123

    Abstract: A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.

    Abstract translation: 处理单元(300)包括只读加密密钥(394)。 从非易失性存储器(270)将加载器代码映像(250)加载到系统存储器(205)中。 装载者代码图像(250)包括前缀值(225)和后缀值(235)。 前缀值(225)与来自处理单元(300)的主密钥(394)组合以创建作为散列算法的种子的随机值。 散列算法使用种子值与由代码块形成的签名形成结果。 在散列算法期间,中间键值被生成并存储在用户不可访问的存储区域中。 加载程序经过身份验证和加载后,加载程序代码使用中间键值。 加载器将一个或多个中间密钥值与前缀和后缀值组合起来,后者值对应于其他软件模块,以使用散列算法对软件进行身份验证,并在验证后加载软件。

    CODING METHOD AND DATA COMPRESSOR

    公开(公告)号:JPH11196000A

    公开(公告)日:1999-07-21

    申请号:JP22879098

    申请日:1998-08-13

    Applicant: IBM

    Inventor: CRAFT DAVID J

    Abstract: PROBLEM TO BE SOLVED: To provide an improved method and system for compressing data. SOLUTION: An input data stream of a primitive symbol is coded and a method for generating an output sequence of a pointer is disclosed. The initial part of the input data stream is coded as a literal pointer by a compressor. The literal pointer includes at least 1 data byte from the data stream. The succeeding parts of the input data stream are coded as a copy pointer. The copy pointer includes an offset denoting a history buffer in a count and compressor. All succeeding data bytes from the input data stream are alternately coded as the literal pointer and the copy pointer. Thus, a coding output sequence outputted from the compressor includes strings of the pointer where the literal pointer and the copy pointer.

    SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS

    公开(公告)号:CA2525376C

    公开(公告)日:2014-02-04

    申请号:CA2525376

    申请日:2003-12-15

    Applicant: IBM

    Inventor: CRAFT DAVID J

    Abstract: A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.

    10.
    发明专利
    未知

    公开(公告)号:DE69834695D1

    公开(公告)日:2006-07-06

    申请号:DE69834695

    申请日:1998-09-14

    Applicant: IBM

    Inventor: CRAFT DAVID J

    Abstract: A method for encoding an input data stream of source symbols to produce an output sequence of pointers is disclosed. An initial part of the input data stream is encoded as a LITERAL_POINTER by a compressor. A LITERAL_POINTER includes at least one data byte from the data stream. A subsequent part of the input data stream is encoded as a COPY_POINTER. The COPY_POINTER includes a count and a displacement pointing to a history-buffer within the compressor. All succeeding data bytes from the input data stream are encoded as LITERAL_POINTERs and COPY_POINTERs in an alternating fashion, such that an encoded output sequence output by the compressor includes a string of pointers alternating between LITERAL_POINTERs and COPY_POINTERs.

Patent Agency Ranking