System and method for tamper-resistant booting
A tamper-proof, operating system technology, applied in the field of encryption, that can solve problems such as thwarting computing devices and no chain of trust
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Various embodiments of the present disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without departing from the spirit and scope of the present disclosure.
[0029] The present disclosure addresses the need in the prior art to verify the authenticity of the boot sequence. A system, method, and non-transitory computer readable medium for booting a computing device having an encrypted storage medium using full disk encryption are disclosed. figure 1 A discussion of an underlying general-purpose system or computing device that can be used to implement the concepts disclosed herein is provided. What follows is a more detailed description of methods for establishing, managing, using, and removing a tamper-resistant boot on a computing device that uses full dis...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 