17968182. Privileged Firmware Mode Protection simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)
Contents
Privileged Firmware Mode Protection
Organization Name
Inventor(s)
Baibhav Singh of Sunnyvale CA (US)
Stephen Elliot Mclaughlin of San Jose CA (US)
Hayawardh Vijayakumar of San Jose CA (US)
Privileged Firmware Mode Protection - A simplified explanation of the abstract
This abstract first appeared for US patent application 17968182 titled 'Privileged Firmware Mode Protection
Simplified Explanation
The abstract describes a method for controlling access to privileged firmware mode on a computing device. The method involves receiving a request from a lower privileged process to access the privileged firmware mode and checking a set of access policies to determine if the request is authorized. Based on this determination, access to the privileged firmware mode is either granted or denied to the lower privileged process.
- The method controls access to privileged firmware mode on a computing device.
- It checks a set of access policies to determine if a request to access privileged firmware mode is authorized.
- Access to privileged firmware mode is granted or denied based on the determination.
Potential Applications
This technology can be applied in various scenarios, including:
- Secure boot processes in computer systems.
- Firmware updates and modifications.
- Access control for system-level configurations.
- Protecting sensitive information stored in privileged firmware.
Problems Solved
This technology addresses the following problems:
- Unauthorized access to privileged firmware mode.
- Ensuring the integrity and security of firmware operations.
- Preventing malicious activities that can compromise system functionality.
- Protecting sensitive data stored in privileged firmware.
Benefits
The use of this technology offers several benefits, such as:
- Enhanced security by controlling access to privileged firmware mode.
- Protection against unauthorized modifications or tampering of firmware.
- Prevention of unauthorized access to system-level configurations.
- Safeguarding sensitive information stored in privileged firmware.
Original Abstract Submitted
In one embodiment, a method includes accessing a request from a lower privileged process executing on a computing device to access a privileged firmware mode of the computing device and accessing a set of access policies for detecting whether the request is an unauthorized access to the privileged firmware mode. The method further includes determining, based on at least part of a content of the request and on the set of access policies, whether the request to access a privileged firmware mode is authorized; and denying or permitting, based on the determination, access by the lower privileged process to the privileged firmware mode.