Claims
- 1. A method of securing access to resources in a computing device, comprising the steps of:
storing an encrypted access code in a known memory location with the computing device; receiving a password to access the resources; encrypting the password to produce a encrypted password; comparing the encrypted password to the encrypted access code; allowing access to the resources if the encrypted access code matches the encrypted password.
- 2. The method of claim 1 wherein the step of storing an encrypted access code comprises the step of storing a hashed access code.
- 3. The method of claim 2 wherein the step of encrypting a password comprises the step of hashing a password.
- 4. The method of claim 1 wherein the encrypted access code is stored in a memory that cannot be externally modified.
- 5. The method of claim 1 wherein the step of allowing access comprises the step of allowing access to testing resources if the encrypted access code matches the encrypted password.
- 6. The method of claim 1 wherein the step of allowing access comprises the step of allowing access to change system parameters if the encrypted access code matches the encrypted password.
- 7. A computing device comprising:
a processing system a memory for storing an encrypted access code; input circuitry for receiving a password to access the resources; wherein the processing circuitry:
encrypts the password to produce a encrypted password; compares the encrypted password to the encrypted access code; allows access to the resources if the encrypted access code matches the encrypted password.
- 8. The computing device of claim 7 wherein the encrypted access code comprises a hashed access code.
- 9. The computing device of claim 8 wherein the encrypted password comprises a hashed password.
- 10. The computing device of claim 7 wherein the encrypted access code is stored in a memory that cannot be externally modified.
- 11. The computing device of claim 7 wherein the processing system allows access to testing resources if the encrypted access code matches the encrypted password.
- 12. The computing device of claim 7 wherein the processing system allows access to system parameters if the encrypted access code matches the encrypted password.
Priority Claims (1)
Number |
Date |
Country |
Kind |
02293057 |
Dec 2002 |
EP |
|
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of the filing date of copending provisional application U.S. Ser. No. 60/399,592, filed Jul. 30, 2002, entitled “Firmware Run-Time Authentication” to Balard et al.
[0002] This application also claims priority under the Paris Convention for the Protection of Intellectual Property of Application Number 02293057.2, filed Dec. 10, 2002 in the European Patent Office. No foreign application for this same subject matter has been filed that has a filing date before Dec. 10, 2002.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60399592 |
Jul 2002 |
US |