Interesting patent 02-11-2010

Technical discussion on the newly released and hard to find PS3.

Moderators: cheriff, emoon

Post Reply
adresd
Posts: 43
Joined: Sat Jan 17, 2004 11:32 am

Interesting patent 02-11-2010

Post by adresd »

A new patent seems to have surfaced by Kanna Shimizu:

20100037068 Method to Protect Secrets Against Encrypted Section Attack 02-11-2010

As can be seen, dated 02-11-2010, so very recent.

Interesting reading as I am sure some of you will agree.

abstract:
"A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key. The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key. The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image. To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the encrypted and signed program code image. The encrypted binding key is then decrypted with a sixth key to extract the binding key. The hash value of the application verification certificate associated with the second key is then calculated and used with the extracted binding key to extract the first key. The extracted first key is then used to decrypt the encrypted application code."

http://www.faqs.org/patents/app/20100037068
Ps3Rips
Posts: 25
Joined: Wed May 02, 2007 5:06 am

Post by Ps3Rips »

Very Interesting.
Seems to be a response to Geohot and the current round of hacking taking place.

However from reading her previous work
http://dslab.lzu.edu.cn:8080/members/zh ... ecture.pdf

it would seem that she predicted those types of attacks and if they implemented all the security in that high level paper, then in theory at least Geohot's attack may give Lv0 command names back via the peek readout but the system should still remain rather secure.
Kicking out a bad guy
Beating up a monster
Fighting against evil
I'll rescue this town
Chinaphoro
Posts: 47
Joined: Mon Jan 03, 2022 10:15 am
Location: http://product-of-china.cf/
Contact:

-

Post by Chinaphoro »

by Dave:
"something easy would be to check to see if equal size armies are in a given radius. that would show games with interesting battles" Ill add where size >= some threshold
Post Reply