Device with chain of trust
An electronic device, entity technology, applied in the direction of security communication devices, computer security devices, instruments, etc., can solve problems such as loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] When the device is powered on, the device can start up according to the boot sequence. Performing the boot sequence may involve booting hardware and / or initializing one or more of the device's firmware and software. At least some of the initialized code (eg, code corresponding to the basic input / output system (BIOS), boot loader, or operating system) may be authenticated prior to initialization. This authentication can take place to ensure that the code has not been tampered with before the device has been powered on.
[0017] In some instances, the code itself may contain instructions for performing authentication on additional code loaded by the code. However, in some instances, portions of the code corresponding to performing this authentication process can be tampered with by unauthorized users. Additionally, as part of authenticating the extra code, the code may contain instructions for checking the signature of the extra code. The different entities initiated a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


