Invention Grant
US09398019B2 Verifying caller authorization using secret data embedded in code 有权
使用嵌入代码中的秘密数据验证来电者授权

Verifying caller authorization using secret data embedded in code
Abstract:
In a computer system operable at more than one privilege level, confidential code is securely customized to use secret data to establish a code protection domain without disclosing the secret data to a managing operating system. In operation, a security module executes at a higher privilege level than both the managing operating system and the confidential code. After the managing operating system loads the executable of the confidential code, the security module injects the secret data directly into an authorization instruction and a verification instruction included in the confidential code and then sets both the authorization instruction and the verification instruction as executable-only. As the confidential code executes at the assigned privilege level, the authorization instruction and the verification instruction use the secret data to distinguish between unauthorized and authorized execution of the confidential code.
Public/Granted literature
Information query
Patent Agency Ranking
0/0