The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 27, 2008

Filed:

Jan. 31, 2005
Applicants:

Pramila Srinivasan, San Jose, CA (US);

John Princen, Cupertino, CA (US);

Frank Berndt, Cupertino, CA (US);

David Blythe, San Carlos, CA (US);

William Saperstein, San Carlos, CA (US);

Wei Yen, Los Altos Hills, CA (US);

Inventors:

Pramila Srinivasan, San Jose, CA (US);

John Princen, Cupertino, CA (US);

Frank Berndt, Cupertino, CA (US);

David Blythe, San Carlos, CA (US);

William Saperstein, San Carlos, CA (US);

Wei Yen, Los Altos Hills, CA (US);

Assignee:

BroadOn Communications Corp., Palo Alto, CA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/02 (2006.01); G06F 13/20 (2006.01); H04L 9/00 (2006.01);
U.S. Cl.
CPC ...
Abstract

A secure processor assuring application software is executed securely, and assuring only authorized software is executed, monitored modes and secure modes of operation. The former executes application software transparently to that software. The latter verifies execution of the application software is authorized, performs any extraordinary services required by the application software, and verifies the processor has obtained rights to execute the content. The secure processor (1) appears hardware-identical to an ordinary processor, with the effect that application software written for ordinary processors can be executed on the secure processor without substantial change, (2) needs only a minimal degree of additional hardware over and above those portions appearing hardware-identical to an ordinary processor. The secure processor operates without substantial reduction in speed or other resources available to the application software. Functions operating in secure mode might reside in an on-chip non-volatile memory, or might be loaded from external storage with authentication.


Find Patent Forward Citations

Loading…