Claims
- 1. An apparatus configured to secure information in a memory of an electronic device, comprising:
a first memory having stored therein a cryptographic hash algorithm; a second memory having stored therein information related to the identification of an electronic device; a third memory having stored therein a first hash value calculated by operation of the cryptographic hash algorithm on the stored information; and a processor for calculating, in response to an occurrence of a predetermined event, a second hash value of the stored information according to the stored cryptographic hash algorithm, and for comparing the second hash value to the first hash value, wherein normal operation of the electronic device is disabled if the second hash value does not match the first hash value.
- 2. The apparatus according to claim 1, wherein the electronic device is a mobile device for connecting to a communications network.
- 3. The apparatus according to claim 1, wherein the first memory is located on the processor of the electronic device.
- 4. The apparatus according to claim 1, wherein the first memory comprises one time programmable memory.
- 5. The apparatus according to claim 1, wherein the first hash value is stored in one time programmable memory.
- 6. The apparatus according to claim 5, wherein the first hash value is stored on the processor.
- 7. The apparatus according to claim 1, wherein the first hash value is stored in memory on the processor of the electronic device.
- 8. The apparatus according to claim 1, wherein the predetermined event is a powering up of the electronic device.
- 9. The apparatus according to claim 1, wherein the predetermined event is an accessing of a predetermined feature by the user of the electronic device.
- 10. The apparatus according to claim 1, wherein disabling normal operation of the electronic device comprises powering down the electronic device.
- 11. The apparatus according to claim 1, further comprising a startup routine, wherein the startup routine is initiated in response to an occurrence of the predetermined event, and the startup routine invokes the stored cryptographic hash algorithm.
- 12. An electronic device with a processor and a memory, wherein a cryptographic hash algorithm is stored on the processor, information identifying the electronic device is stored in the memory, and a hash value according to the cryptographic hash algorithm and the identifying information is stored in the memory; and wherein, if the stored cryptographic hash algorithm later calculates a hash value of the stored identifying information that fails to match the stored hash value, a normal operation of the electronic device is disabled.
- 13. A method for securing information in the memory of a device, comprising:
storing a cryptographic hash algorithm in a memory on a device; storing information in a memory on the device; storing a first hash value in a memory on the device; in response to an occurrence of a predetermined event on the device, calculating a second hash value according to the stored information and the stored cryptographic hash algorithm; comparing the second hash value to the first hash value; and disabling normal operation of the device if the second hash value does not match the first hash value.
- 14. The method according to claim 13, wherein the device is a mobile device for connecting to a communications network.
- 15. The method according to claim 13, further including storing the cryptographic hash algorithm in a memory on a processor of the device.
- 16. The method according to claim 15, further including storing the cryptographic hash algorithm in one time programmable memory.
- 17. The method according to claim 13, further including storing the cryptographic hash algorithm in a one time programmable memory on the device.
- 18. The method according to claim 13, further including calculating the first hash value according to the stored information and the cryptographic hash algorithm.
- 19. The method according to claim 18, further including storing the calculated first hash value in a one time programmable memory.
- 20. The method according to claim 18, further including storing the calculated first hash value in a memory on a processor of the device.
- 21. The method according to claim 13, wherein the predetermined event is a powering up of the device.
- 22. The method according to claim 13, wherein the predetermined event is an accessing of a predetermined feature by the user of the device.
- 23. The method according to claim 13, wherein disabling normal operation of the electronic device comprises powering down the electronic device.
- 24. The method according to claim 13, further comprising storing a startup routine in the device, wherein the startup routine is initiated in response to an occurrence of the predetermined event, and the startup routine invokes the stored cryptographic hash algorithm.
- 25. A computer readable medium encoded with software to secure information in the memory of an electronic device by storing a cryptographic hash algorithm in a memory on an electronic device; storing information in a memory on the electronic device; storing a first hash value in a memory on the electronic device; in response to an occurrence of a predetermined event on the electronic device, calculating a second hash value according to the stored information and the stored cryptographic hash algorithm; comparing the second hash value to the first hash value; and disabling a normal operation of the electronic device if the second hash value does not match the first hash value.
- 26. A method for securing information in the memory of a device, comprising:
storing a cryptographic hash algorithm in a memory on a device; storing information in a memory on the device; storing serial number information in a memory on the device; storing in a memory on the device a first hash value calculated by the cryptographic hash algorithm based on said stored information and said serial number information; in response to an occurrence of a predetermined event on the device, calculating a second hash value according to the stored cryptographic hash algorithm; comparing the second hash value to the first hash value; and disabling a normal operation of the device if the second hash value does not match the first hash value.
- 27. The method according to claim 26, wherein the serial number information is a serial number of a processor of the device.
- 28. The method according to claim 27, further including calculating the second hash value based on the stored information and the stored serial number information.
- 29. The method according to claim 26, wherein the serial number information is a serial number of a memory component of the device.
- 30. The method according to claim 29, further including calculating the second hash value based on the stored information and the stored serial number information.
- 31. A method for securing information in the memory of an electronic device, comprising:
storing a cryptographic hash algorithm in a memory on an electronic device; storing control information in a memory on the electronic device; storing in a memory on the electronic device a first hash value calculated from the control information according to the cryptographic hash algorithm; in response to an occurrence of a predetermined event on the electronic device, calculating a second hash value according to the stored cryptographic hash algorithm; comparing the second hash value to the first hash value; and disabling a normal operation of the electronic device if the second hash value does not match the first hash value.
- 32. An apparatus configured to secure information in a memory of an electronic device, comprising:
a first memory having stored therein a cryptographic hash algorithm; a second memory having stored therein information related to the operation of an electronic device; a third memory having stored therein a first hash value calculated by operation of the cryptographic hash algorithm on the stored information; and a processor for calculating, in response to an occurrence of a predetermined event, a second hash value of the stored information according to the stored cryptographic hash algorithm, and for comparing the second hash value to the first hash value, wherein normal operation of the electronic device is disabled if the second hash value does not match the first hash value.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is based upon and claims priority from United States provisional patent application No. 60/281,369, filed Apr. 5, 2001, the entire contents of which are hereby incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60281369 |
Apr 2001 |
US |