The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 07, 2015

Filed:

Mar. 27, 2008
Applicants:

Jiang Zhang, La Jolla, CA (US);

Peter Chen, San Diego, CA (US);

Alexander Medvinsky, San Diego, CA (US);

Inventors:

Jiang Zhang, La Jolla, CA (US);

Peter Chen, San Diego, CA (US);

Alexander Medvinsky, San Diego, CA (US);

Assignee:

General Instrument Corporation, Horsham, PA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 11/30 (2006.01); H04L 9/08 (2006.01); G06F 21/76 (2013.01); G06F 12/14 (2006.01); G06F 21/73 (2013.01);
U.S. Cl.
CPC ...
G06F 21/76 (2013.01); G06F 12/1466 (2013.01); G06F 21/73 (2013.01); G06F 2221/2129 (2013.01);
Abstract

A method, device and system for authenticating a programmable hardware device, such as a programmable hardware chip, and a command received by the programmable hardware device. A secure processor or other trusted source authenticates the programmable hardware chip by verifying, with the secure processor's own verification key, a random number sent to the programmable hardware chip and encrypted using a verification key embedded within the programmable hardware chip, since the nature of the encryption is such that only the original logic function that includes the verification key can encrypt the data correctly. A command received by the programmable hardware chip is authenticated by verifying that a command authentication token received by the programmable hardware chip is generated using the correct command authentication key and consequently verifying that the command is received from the secure processor, as only the party who has the command authentication key can encrypt the data correctly.


Find Patent Forward Citations

Loading…