High-assurance secure boot content protection

a security and boot content technology, applied in the field of secure boot content protection, can solve problems such as the vulnerability of the computer system to hacking, and achieve the effects of improving security, less expensive, and hardening the encryption process

Inactive Publication Date: 2006-02-02
INFORMATION ASSURANCE SYST +1
View PDF18 Cites 65 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011] The disclosed system includes a selector element coupled to the boot flash memory. This switch element operates under the control of a trusted hardware processor that is separate from the main processor. The selector element allows the trusted processor to authenticate the boot program before allowing the main processor to execute it to boot up the computer. It also permits the boot program to be securely stored.
[0012] The disclosed system also incorporates a “heartbeat monitor” function, which allows the trusted processor to monitor and verify the encryption of files and data being stored on the hard drive or other storage device. This “hardens” the encryption process, and eliminates the need for the main processor to include a secure hardware processor to perform the required file encryption / decryption. This increases security without the extra expense and eventual obsolescence inherent in hardware processor solutions.
[0013] Adequate security can be achieved without the problems associated with a trusted main processor because the trusted processor can control the secure boot contents and authenticate the boot program before providing it to the main processor for execution. It also permits monitoring the authenticity of data stored in the data storage devices. Relieved of trusted processor requirements, the main processor can be less expensive, faster, and can be easily upgraded when necessary. Further, the trusted processor can be designed so that it is adaptable to a wide variety of main processor technology roadmaps.

Problems solved by technology

Unfortunately, during boot-up, the computer system is vulnerable to hacking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-assurance secure boot content protection
  • High-assurance secure boot content protection
  • High-assurance secure boot content protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In the following description, reference is made to the accompanying drawings which form a part hereof, and which is shown, by way of illustration, several embodiments of the present invention. It is understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the present invention.

Hardware Environment

[0023] A conventional computer system 100 is illustrated in FIG. 1. The computer 102 comprises a processor 104 coupled to one or more memory devices via an I / O device control hub 105 or similar device. Such memory devices can include random access memory (RAM) 106. The computer 102 is operatively coupled to a display 122, which presents images such as windows to the user on a graphical user interface 118B. The computer 102 may be coupled to other devices, such as a keyboard 114, a mouse device 116, a printer, etc.

[0024] Generally, the computer 102 operates under control of an operating system 108 stored in the memory ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and apparatus for high assurance boot processing is disclosed. A trusted processor is used to authenticate a trusted boot program and in conjunction with a selector, to provide the authenticated boot program to a boot memory where it can be accessed by a main processor to execute the bootup sequence. The trusted processor also provides a command for the main processor to write a data sequence to a hard drive or similar device, and monitors the data written by the main processor to verify that the data has not been tampered with or otherwise compromised.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application claims benefit of U.S. Provisional Patent Application No. 60 / 593,015, entitled “HIGH-ASSURANCE PROCESSOR ACTIVE MEMORY CONTENT PROTECTION,” by Michael Masaji Furusawa and Chieu T. Nguyen, filed Jul. 30, 2004, and U.S. Provisional Patent Application No. 60 / 593,016, entitled “HIGH-ASSURANCE SECURE BOOT CONTENT PROTECTION,” by Michael Masaji Furusawa, and Chieu T. Nguyen, filed Jul. 30, 2004 which applications are hereby incorporated by reference herein. [0002] This application is related to the following co-pending and commonly assigned patent application, which application is also incorporated by reference herein: [0003] application Ser. No. ______, entitled “HIGH-ASSURANCE PROCESSOR ACTIVE MEMORY CONTENT PROTECTION,” filed on same date herewith, by Michael Masaji Furusawa and Chieu T. Nguyen.BACKGROUND OF THE INVENTION [0004] 1. Field of the Invention [0005] The present invention relates to systems and methods of secure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F9/24
CPCG06F21/575
Inventor FURUSAWA, MICHAEL MASAJINGUYEN, CHIEU THE
Owner INFORMATION ASSURANCE SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products