Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Boot Validation in Imaging Devices

a technology of imaging device and boot validation, which is applied in the field of secure booting of computer systems, can solve the problems of limiting the overall security of the system, and the weakest link may be the vulnerability of embedded firmware to tampering

Inactive Publication Date: 2008-12-18
LEXMARK INT INC
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0008]One embodiment of the present invention provides a system for boot validation in an image forming device including at least one central processing unit (CPU). The system includes a firmware storage device including firmware, the firmware including at least boot code. The system further includes a secure non-volatile storage device storing a preprogrammed hash value corresponding to the boot code. The system further includes logic configured to hold at least the CPU in reset in response to a power on signal to prevent the CPU from executing the boot code upon powering on the image forming device, to retrieve the boot code, to compute a hash value of the boot code, to retrieve the preprogrammed hash value, to compare the computed hash value to the preprogrammed hash value, and to allow the image forming device to execute the boot code if the computed hash value matches the preprogrammed hash value. In one such embodiment, the boot code includes tamper detection code configured to validate other firmware. The system may include, for example, an application specific integrated circuit (ASIC) including the logic, or a boot validation device including the logic, or an ASIC and a boot validation device operatively coupled to one another, wherein the boot validation device includes the logic. In another particular case, the firmware storage device is for storing the boot code together with other executable code including firmware other than boot code. In another particular case, the logic is configured to inhibit operation of at least one component of the image forming device if the computed hash value does not match the preprogrammed hash value. The image forming device may be, for example, one of a printer, a fax device, a copier, or a combination thereof. The system may be contained in a cartridge configured for use in the image forming device. The firmware storage device may include, for example, programmable non-volatile memory.

Problems solved by technology

In any security system, the weakest link may limit the overall security of the system.
In the printer architecture, for example, one of the weakest links may be the vulnerability of the embedded firmware to tampering.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Boot Validation in Imaging Devices
  • Boot Validation in Imaging Devices
  • Boot Validation in Imaging Devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]A boot validation system and method may be used in a computer system to validate boot code before allowing the computer system to execute the boot code. Once the boot code is validated, the boot code may be executed to validate other executable code (e.g., firmware) in the computer system. In an exemplary embodiment, the boot validation system and method may be used in an imaging device, such as an electrophotographic printer, an inkjet printer, a fax device, a copier, an all-in-one device or a multipurpose device. Those skilled in the art will recognize that the boot validation system and method may be used in other computer systems.

[0019]Referring to FIG. 1, a boot validation system and method, consistent with one embodiment, may be used in an imaging system 100. The imaging system 100 may include an imaging apparatus or device 102 and a host 104 that communicates via a communication link 106. The communication link 106 may include any structure that facilitates electronic c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A boot validation system and method may be used in a computer system to validate boot code before allowing the computer system to execute the boot code. In particular, a secure hash algorithm may be used to compute a hash value of the boot code and the computed hash value may be compared to a preprogrammed hash value stored in a secure non-volatile device. If the hash values match the boot code may be validated and the system may then be allowed to execute the boot code. Once the boot code is validated, the boot code may be executed to validate other code (e.g., firmware) in the computer system. In an exemplary embodiment, the boot validation system and method may be used in an imaging device, such as a printer.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]The present application is a divisional of U.S. patent application Ser. No. 11 / 425,893, filed Jun. 22, 2006, which is incorporated herein by reference in its entirety.STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT[0002]None.REFERENCE TO SEQUENTIAL LISTING, ETC.[0003]None.BACKGROUND[0004]1. Field of Invention[0005]The present invention relates to securely booting computer systems, and more particularly, to a boot validation system and method for use in an image forming device such as, for example, an electrophotographic printer, an inkjet printer, a fax device, a copier, an all-in-one device or a multipurpose device.[0006]2. Description of Related Art[0007]Imaging devices, such as printers, may include various security systems, for example, to protect billing information and / or to protect confidential customer data. In general, mechanisms for achieving printer security may include both hardware and software. In any security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/177
CPCG06F21/575
Inventor BOOTH, JAMES RONALDCORBETT, JR., WILLIAM POHLGOSTOMSKI, JOHN FRANCISPARTINGTON, MIKE
Owner LEXMARK INT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products