Use of hashing in a secure boot loader


The foregoing aspects and many of the attendant advantages of this invention will become more readily appreciated as the same becomes better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:

FIG. 1 is an isometric schematic view of a game console that employs the present invention;

FIG. 2A is a block diagram of several functional components included in the game console of FIG. 1;

FIG. 2B is a functional block diagram of a general electronic device that boots-up and includes a processor and memory;

FIG. 3 is a schematic diagram illustrating portions of a memory as configured in the present invention; and

FIG. 4 is a flow chart illustrating the logic implemented in the present invention.