17846349. TRUSTED COMPUTING DEVICE AND OPERATING METHOD THEREOF simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)
TRUSTED COMPUTING DEVICE AND OPERATING METHOD THEREOF
Organization Name
Inventor(s)
TRUSTED COMPUTING DEVICE AND OPERATING METHOD THEREOF - A simplified explanation of the abstract
This abstract first appeared for US patent application 17846349 titled 'TRUSTED COMPUTING DEVICE AND OPERATING METHOD THEREOF
Simplified Explanation
Abstract
A trusted computing device and operating method are described in this patent application. The device includes a firmware-driven device and a master controller that generates an authentication value from the firmware and checks its integrity at regular intervals. The master controller consists of an authentication value generator, an authentication value repository, a security core, and an integrity checker.
Bullet Points
- Trusted computing device with firmware-driven device and master controller
- Master controller generates authentication value from firmware
- Integrity of authentication value checked at regular intervals
- Master controller includes authentication value generator, authentication value repository, security core, and integrity checker
Potential Applications
- Secure communication devices
- Financial transaction systems
- Cloud computing infrastructure
- Internet of Things (IoT) devices
- Critical infrastructure protection
Problems Solved
- Ensures the integrity of firmware-driven devices
- Protects against unauthorized access to authentication values
- Prevents tampering or modification of authentication values
- Enhances overall security of computing devices
Benefits
- Increased trust and reliability in computing devices
- Protection against unauthorized access and tampering
- Improved security for sensitive data and transactions
- Enhanced integrity checking for firmware-driven devices
Original Abstract Submitted
A trusted computing device and an operating method thereof are provided. Provided is a trusted computing device including, a device driven by firmware, and a master controller generating an authentication value from the firmware and checking integrity for the authentication value at a first period, wherein the master controller includes, an authentication value generator generating the authentication value, an authentication value repository storing the authentication value, a security core blocking access from the outside with respect to the authentication value stored in the authentication value repository, and an integrity checker checking integrity for the authentication value stored in the authentication value repository.