Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for tamper-resistant booting

A tamper-proof, operating system technology, applied in the field of encryption, that can solve problems such as thwarting computing devices and no chain of trust

Active Publication Date: 2016-01-13
APPLE INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Without a chain of trust from the bootloader to the operating system kernel, this attack is capable of defeating even full-disk encrypted computing devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for tamper-resistant booting
  • System and method for tamper-resistant booting
  • System and method for tamper-resistant booting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Various embodiments of the present disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without departing from the spirit and scope of the present disclosure.

[0029] The present disclosure addresses the need in the prior art to verify the authenticity of the boot sequence. A system, method, and non-transitory computer readable medium for booting a computing device having an encrypted storage medium using full disk encryption are disclosed. figure 1 A discussion of an underlying general-purpose system or computing device that can be used to implement the concepts disclosed herein is provided. What follows is a more detailed description of methods for establishing, managing, using, and removing a tamper-resistant boot on a computing device that uses full dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for booting a computing device having an encrypted storage medium using full disk encryption, referred to as a tamper-resistant boot. The system retrieves the kernel cache and the kernel cache digest from the unencrypted storage medium, and verifies the authenticity of the kernel cache based on the credentials and the kernel cache digest. If the kernel cache is trusted, the boot and execution of the operating system is performed. In one embodiment, the system verifies the authenticity of the request to disable tamper-resistant boot by utilizing a password verifier and password attestation.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Patent Application Serial No. 13 / 007,529, filed January 14, 2011, and entitled "SYSTEM AND METHODS FORTAMPER-RESISTANT BOOTING," which is hereby incorporated by reference in its entirety. technical field [0003] The present disclosure relates to encryption, and more particularly, to tamper-resistant booting of computing devices. Background technique [0004] Many computing devices today require some level of information protection. Cryptography is one such method for securing computing devices. Cryptography refers to both encryption and decryption of information. Encryption is a process of changing intelligible information (plaintext) into unintelligible information (ciphertext), and decryption is a process of changing ciphertext back to plaintext. [0005] Computing devices can encrypt data of varying sizes, from small collections of data to large chunks of data. Full Disk...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46G06F21/78
CPCG06F21/44G06F21/575G06F21/80G06F9/24G06F21/00G06F21/72
Inventor I·科尔斯蒂克J·埃维恩
Owner APPLE INC