Claims
- 1. An automated method for determining whether to allow a portion of software stored in a computer-readable memory to access to a portion of a nonvolatile memory, comprising:
(a) receiving a reference to said portion of software wishing to receive access to said nonvolatile memory portion; (b) computing a cryptographic hash of said software portion; (c) comparing said computed cryptographic hash with a value stored in said nonvolatile memory; (d) if said computed cryptographic hash matches said stored value, executing said software portion with access to said nonvolatile memory portion; and (e) if said computed cryptographic hash does not match said stored value, not allowing said software portion to access said nonvolatile memory.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation-in-part of application Ser. No. 10/113,363, filed Mar. 27, 2002, which claims the benefit of Provisional Application No. 60/279,323, filed Mar. 28, 2001.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60279323 |
Mar 2001 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10113363 |
Mar 2002 |
US |
Child |
10614765 |
Jul 2003 |
US |