18082889. TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS simplified abstract (QUALCOMM Incorporated)
Contents
TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS
Organization Name
Inventor(s)
Yashavantha Rao of Hyderabad (IN)
Tanya Mahajan of Bangalore (IN)
Benish Babu of San Diego CA (US)
Prashanth Mayya of Bangalore (IN)
TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18082889 titled 'TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS
The abstract describes systems and techniques for image authentication for secure boot processes. This involves actions such as receiving a request to load an image during secure boot, obtaining a digest of the image, storing the digest in a secure register, and comparing it to a previously calculated digest to ensure authenticity.
- Receiving requests to load images during secure boot processes
- Obtaining and storing image digests in a secure cryptographic hardware component
- Comparing stored digests with previously calculated digests to verify image authenticity
Potential Applications: - Secure boot processes in computer systems - Ensuring the integrity of images during system startup
Problems Solved: - Preventing unauthorized or tampered images from being loaded during secure boot - Verifying the authenticity of images to enhance system security
Benefits: - Increased security during system startup - Protection against malicious attacks through image authentication
Commercial Applications: Title: Secure Boot Image Authentication Technology for Enhanced System Security This technology can be used in industries where secure boot processes are crucial, such as cybersecurity, defense, and critical infrastructure.
Questions about Image Authentication Technology: 1. How does image authentication enhance system security during boot processes?
- Image authentication ensures that only authentic and unaltered images are loaded during system startup, preventing potential security breaches.
2. What are the key components involved in the image authentication process?
- The process involves cryptographic hardware components, secure memory devices, and secure registers to store and compare image digests.
Original Abstract Submitted
Systems and techniques are described herein for image authentication for secure boot. For example, a process the image authentication can include: receiving, a request to load an image during a secure boot process; performing, at the secure entity, a secure boot configuration action set in response to receiving the request; requesting the image from a storage device; transmitting the image to a cryptographic hardware component; obtaining, at the cryptographic hardware component, a digest corresponding to at least a portion of the image; storing the digest in the secured register of the cryptographic hardware component; storing the image in a secured memory device portion; obtaining, at the secure entity, a previously calculated digest corresponding to the image from the secured memory device portion; obtaining, at the secure entity, the digest from the secured register; and performing a comparison to determine whether the digest and the previously calculated digest match.