FIELD: information technology.
SUBSTANCE: method involves reception of a payload data element using a processing device; performing cryptographic authentication of the payload data element; storing the authenticated received payload data element in a data processing device, and protecting integrity of the stored payload data element. The cryptographic authentication process involves calculation of a control hash function value of at least the received data element. Protection of integrity also involves calculation the standard value of a message authentication code at least for the control hash function value using a secret key stored in the data processing device as input data.
EFFECT: more computationally efficient mechanism for providing security, which protects software and when loading software into a device.
34 cl, 11 dwg
Title | Year | Author | Number |
---|---|---|---|
PROTECTED BOOTSTRAPPING FOR WIRELESS COMMUNICATION | 2006 |
|
RU2374778C2 |
AFFIXMENT OF SOFTWARE TO HARDWARE WITH APPLICATION OF CRYPTOGRAPHY | 2004 |
|
RU2356169C2 |
METHOD AND USER AUTHENTICATION SYSTEM THROUGH MOBILE DEVICE WITH USAGE OF CERTIFICATES | 2013 |
|
RU2638741C2 |
FORMING THE KEY DEPENDING ON THE PARAMETER | 2017 |
|
RU2670778C9 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
METHOD AND DEVICE FOR MUTUAL AUTHENTICATION | 2007 |
|
RU2420896C2 |
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL | 2006 |
|
RU2391796C2 |
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION | 2008 |
|
RU2428808C2 |
FORMING THE KEY DEPENDING ON THE PARAMETER | 2017 |
|
RU2671052C1 |
METHOD, DEVICE AND COMPUTER SOFTWARE PRODUCT FOR SOFTWARE VERSIONS CONTROL | 2009 |
|
RU2494456C2 |
Authors
Dates
2010-12-27—Published
2005-09-07—Filed