Globally valid measured operating system launch with hibernation support

A technology for computing equipment and log files, used in transmission systems, digital transmission systems, security communication devices, etc.

Active Publication Date: 2012-06-20
MICROSOFT TECH LICENSING LLC
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the value of the PCR may no longer be

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Globally valid measured operating system launch with hibernation support
  • Globally valid measured operating system launch with hibernation support
  • Globally valid measured operating system launch with hibernation support

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following description involves setting the values ​​of at least some of the Platform Configuration Registers (PCRs) of the Trusted Execution Environment, together with the Trusted Execution Environment's The value of the monotonic counter is recorded in the event log. Just then and thereafter, the previous event log into which this information was entered—saved as part of the hibernation image—can be concatenated with the current event log, thereby providing a secure record of at least A mechanism for computing the history of a device since the most recent power-on or reboot.

[0023] The mechanisms described here focus on, but are not limited to, actual computing devices entering a low power "sleep" mode or state. Indeed, the following teachings are equally applicable to virtual computing devices that emulate the operation of actual computing devices, and can be applied not only across hibernate and resume cycles, but also across where the state of the computing d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An event log can comprise, not only entries associated with components instantiated since a most recent power on of a computing device, but also entries of components instantiated prior to that power on, such as components that were instantiated, and represent, a state of the computing device prior to hibernation that has now been resumed. Upon hibernation, the current values of the Platform Configuration Registers (PCRs) of a Trusted Platform Module (trusted execution environment), as well as a quote of those current values, and a current value of a monotonic counter of the trusted execution environment can be logged. The monotonic counter can be incremented at each power on to track successive generations of the computing device and to guard against an intervening, not-logged generation. A subsequent parsing of the event log can verify the prior generational entries with reference to the PCR values in the log that are associated with those generations.

Description

Background technique [0001] A modern computing device often includes a Trusted Platform Module (TPM) that provides security functionality to its host computing device. The TPM, as a hardware component, can provide enhanced security over that which is only obtainable through the execution of computer-executable instructions by the computing device. More specifically, the hardware of conventional TPMs is designed to protect information stored within the TPM by enabling access to and modification of such information only via specific channels and specific functions, and by preventing access to Other access or modification of such information. Thus, even though a malicious entity would gain physical access to the TPM itself, the information stored within the TPM remains protected, except where really exotic and advanced forensics are applied. [0002] One set of information that is typically stored in a TPM is the values ​​stored in the TPM's Platform Configuration Registers (PC...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00
CPCG06F21/57G06F2221/2101H04L9/0897
Inventor S.托姆N.伊德S.D.安德森R.K.斯皮格D.J.林斯利M.F.诺瓦克M.奈斯特伦
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products