Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for providing a secure boot architecture

A security and machine technology, applied in computer security devices, microprogram loading, memory address/allocation/relocation, etc., can solve problems such as the vulnerability of secure computing architectures

Inactive Publication Date: 2008-04-23
高智发明风险投资有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the bonding process for multi-code block authentication still relies on the assumption that the root block of the code is trusted
Thus, customary secure computing architectures remain vulnerable as a result of the fact that the root block is not trusted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for providing a secure boot architecture
  • System and method for providing a secure boot architecture
  • System and method for providing a secure boot architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Detailed Description of the Preferred Embodiment

[0017] Reference will now be made in detail to the embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with these Embodiments, it will be understood that they are not intended to limit the invention to these Embodiments. On the contrary, the invention covers alternatives, modifications and equivalents, which may be included within the field defined by the claims of the present invention. Further, in the following detailed description of the present invention, numerous specific details are set up in order to provide a thorough understanding of the present invention. However, the invention may be practiced without these specific details. In other instances, well-known methods, components and circuits have not been described in detail so as not to unnecessarily obscure aspects of the present invention.

[0018] Embodiments of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for providing a secure boot architecture, in accordance with one embodiment of the present invention, includes a processor having an atomic state machine and a physically protected storage area. The atomic state machine stores a state of the processor in a state save map upon a boot-mode event. The atomic state machine also authenticates an object of a Pre-BIOS Boot Vector Region (PBBVR) in response to the boot-mode event. The PBBVR may be stored in the physically protected storage area. The atomic state machine loads the PBBVR from the physically protected storage area into an overlay memory if the PBBVR is successfully authenticated. The processor executes the PBBVR from the overlay memory if the PBBVR is successfully authenticated. The atomic state machine may also receive a candidate PBBVR upgrade image, authenticate the candidate PBBVR upgrade image, and replace the current PBBVR with a new PBBVR contained in the candidate PBBVR upgrade image if the new PBBVR in the candidate PBBVR upgrade image is authenticated.

Description

technical field [0001] The present invention relates to a system and method for providing a secure boot framework. Background technique [0002] Executing a block of instructions by a processor is generally to perform some operation. The entire sequence of instructions is to a large extent valid from the processor's point of view. The processor has no meaningful intent for a complete and / or valid program or function. Thus, if a block of instructions can be presented to the processor, it will generally be executed. Therefore, the inclusion of so-called legitimate instructions will reliably cause the processor to execute, malfunction, or halt. [0003] Therefore, it is intended to use the processor to limit the execution of the code. One of the methods of restricting execution is by using authentication of instruction sequences. As is conventional in the art, one or more code blocks may be authenticated to provide a secure computing environment. The authentication proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/02G06F9/24
CPCG06F21/575
Inventor 安德鲁·摩根克里斯蒂·鲁道夫古乐默·罗泽斯
Owner 高智发明风险投资有限公司