Computer Extensions for One-Time Secure Execution

A method for limiting execution of an encrypted computer program on a secure processor includes executing a first set of instructions encoding a test for determining whether a value of a register of the secure processor belongs to a set of valid register values encoded in the encrypted computer program. Execution of the first set of instructions causes the secure processor to read a first register value from the register of the secure processor, the register of the secure processor preventing repeated reads of a same value of the register, and determine whether the first register value belongs to the set of valid register values encoded in the encrypted computer program. Execution of further instructions of the encrypted computer program is prevented if the first register value does not belong to the set of valid register values encoded in the encrypted computer program.

Researchers

Departments: Lincoln Laboratory
Technology Areas: Computer Science: Cybersecurity
Impact Areas: Connected World

  • limted execution of software on a processor
    United States of America | Granted | 10,169,251

License this technology

Interested in this technology? Connect with our experienced licensing team to initiate the process.

Sign up for technology updates

Sign up now to receive the latest updates on cutting-edge technologies and innovations.