18082889. TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS simplified abstract (QUALCOMM Incorporated)

From WikiPatents
Revision as of 06:47, 22 June 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS

Organization Name

QUALCOMM Incorporated

Inventor(s)

Yashavantha Rao of Hyderabad (IN)

Tanya Mahajan of Bangalore (IN)

Benish Babu of San Diego CA (US)

Prashanth Mayya of Bangalore (IN)

TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18082889 titled 'TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS

The abstract describes systems and techniques for image authentication for secure boot processes. This involves actions such as receiving a request to load an image during secure boot, obtaining a digest of the image, storing the digest in a secure register, and comparing it to a previously calculated digest to ensure authenticity.

  • Receiving requests to load images during secure boot processes
  • Obtaining and storing image digests in a secure cryptographic hardware component
  • Comparing stored digests with previously calculated digests to verify image authenticity

Potential Applications: - Secure boot processes in computer systems - Ensuring the integrity of images during system startup

Problems Solved: - Preventing unauthorized or tampered images from being loaded during secure boot - Verifying the authenticity of images to enhance system security

Benefits: - Increased security during system startup - Protection against malicious attacks through image authentication

Commercial Applications: Title: Secure Boot Image Authentication Technology for Enhanced System Security This technology can be used in industries where secure boot processes are crucial, such as cybersecurity, defense, and critical infrastructure.

Questions about Image Authentication Technology: 1. How does image authentication enhance system security during boot processes?

  - Image authentication ensures that only authentic and unaltered images are loaded during system startup, preventing potential security breaches.

2. What are the key components involved in the image authentication process?

  - The process involves cryptographic hardware components, secure memory devices, and secure registers to store and compare image digests.


Original Abstract Submitted

Systems and techniques are described herein for image authentication for secure boot. For example, a process the image authentication can include: receiving, a request to load an image during a secure boot process; performing, at the secure entity, a secure boot configuration action set in response to receiving the request; requesting the image from a storage device; transmitting the image to a cryptographic hardware component; obtaining, at the cryptographic hardware component, a digest corresponding to at least a portion of the image; storing the digest in the secured register of the cryptographic hardware component; storing the image in a secured memory device portion; obtaining, at the secure entity, a previously calculated digest corresponding to the image from the secured memory device portion; obtaining, at the secure entity, the digest from the secured register; and performing a comparison to determine whether the digest and the previously calculated digest match.