18064901. MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE simplified abstract (QUALCOMM Incorporated)

From WikiPatents
Jump to navigation Jump to search

MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE

Organization Name

QUALCOMM Incorporated

Inventor(s)

Aneesh Bansal of San Diego CA (US)

Priyanka Dosi of San Diego CA (US)

Ghanashyam Prabhu of San Diego CA (US)

MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18064901 titled 'MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE

Simplified Explanation

The patent application describes a process for image authentication for secure boot, ensuring that the image loaded into memory is authentic and secure.

  • Obtaining an expected tag image with a corresponding tag for the image to be loaded.
  • Loading the expected tag into a memory region for authentication.
  • Loading the image into another memory region.
  • Authenticating the image using a hardware memory authenticator.
  • Reading a portion of the image and generating an authentication tag.
  • Comparing the authentication tag with the expected tag for authentication.

Key Features and Innovation

  • Secure boot process for image authentication.
  • Use of hardware memory authenticator for authentication.
  • Comparison of authentication tags for verification.

Potential Applications

The technology can be used in secure boot processes for various devices, including computers, smartphones, and IoT devices.

Problems Solved

Ensures that only authentic images are loaded into memory during the boot process, preventing unauthorized access or tampering.

Benefits

  • Enhanced security for boot processes.
  • Protection against unauthorized access or malware.
  • Reliable authentication of images loaded into memory.

Commercial Applications

Secure boot processes for devices in industries such as cybersecurity, IoT, and data protection.

Prior Art

Readers can explore prior research on image authentication, secure boot processes, and hardware memory authentication for related technologies.

Frequently Updated Research

Stay updated on advancements in image authentication, secure boot technologies, and hardware memory authentication for the latest developments in secure systems.

Questions about Image Authentication for Secure Boot

How does image authentication for secure boot enhance system security?

Image authentication for secure boot ensures that only verified and authentic images are loaded into memory, preventing unauthorized access or tampering during the boot process. This enhances system security by providing a secure foundation for the device to operate.

What are the key components of the hardware memory authenticator in the authentication process?

The hardware memory authenticator plays a crucial role in the authentication process by storing the expected tag, generating authentication tags, and comparing them with the expected tag to authenticate the image loaded into memory. This ensures the integrity and security of the boot process.


Original Abstract Submitted

Systems and techniques are provided for image authentication for secure boot. For example, a process for image authentication for secure boot can include: obtaining an expected tag image comprising an expected tag corresponding to an image to be loaded into memory; loading the expected tag into a first memory region corresponding to a hardware memory authenticator; loading, by the memory controller, the image into a second memory region; providing an authentication indication to the hardware memory authenticator, wherein the authentication indication triggers the hardware memory authenticator to authenticate the image; reading a portion of the image from the second memory region; generating, at the hardware memory authenticator, an authentication tag corresponding to the portion of the image; and performing a comparison of the authentication tag and the expected tag to obtain an authentication result, wherein, the authentication result is a successful match, and the portion of the image is authenticated.