Qualcomm incorporated (20240193246). MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE simplified abstract

From WikiPatents
Jump to navigation Jump to search

MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE

Organization Name

qualcomm incorporated

Inventor(s)

Aneesh Bansal of San Diego CA (US)

Priyanka Dosi of San Diego CA (US)

Ghanashyam Prabhu of San Diego CA (US)

MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240193246 titled 'MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE

Simplified Explanation

The patent application describes a process for image authentication for secure boot, ensuring that the image loaded into memory is authentic and secure.

  • Obtaining an expected tag image with a corresponding tag for the image to be loaded into memory.
  • Loading the expected tag into a hardware memory authenticator.
  • Loading the image into memory.
  • Triggering the hardware memory authenticator to authenticate the image.
  • Reading a portion of the image and generating an authentication tag.
  • Comparing the authentication tag with the expected tag for authentication.

Key Features and Innovation

  • Secure boot process for image authentication.
  • Use of hardware memory authenticator for authentication.
  • Comparison of authentication tags for verification.

Potential Applications

This technology can be applied in secure boot processes for various devices such as computers, smartphones, and IoT devices.

Problems Solved

Ensures that only authentic images are loaded into memory during the boot process, preventing unauthorized access and tampering.

Benefits

  • Enhanced security for boot processes.
  • Protection against unauthorized access and malware attacks.
  • Ensures the integrity of the loaded images.

Commercial Applications

Secure boot processes in computers, smartphones, IoT devices, and other electronic systems can benefit from this technology to enhance security and prevent unauthorized access.

Prior Art

Prior research in image authentication and secure boot processes can provide insights into similar technologies and approaches.

Frequently Updated Research

Stay updated on advancements in hardware memory authentication and secure boot processes to enhance the effectiveness and security of image authentication technologies.

Questions about Image Authentication for Secure Boot

How does image authentication for secure boot enhance system security?

Image authentication for secure boot ensures that only authentic images are loaded into memory, preventing unauthorized access and potential security breaches.

What are the potential applications of image authentication for secure boot beyond computers and smartphones?

Image authentication for secure boot can be applied in various electronic devices, including IoT devices, to enhance security and protect against unauthorized access.


Original Abstract Submitted

systems and techniques are provided for image authentication for secure boot. for example, a process for image authentication for secure boot can include: obtaining an expected tag image comprising an expected tag corresponding to an image to be loaded into memory; loading the expected tag into a first memory region corresponding to a hardware memory authenticator; loading, by the memory controller, the image into a second memory region; providing an authentication indication to the hardware memory authenticator, wherein the authentication indication triggers the hardware memory authenticator to authenticate the image; reading a portion of the image from the second memory region; generating, at the hardware memory authenticator, an authentication tag corresponding to the portion of the image; and performing a comparison of the authentication tag and the expected tag to obtain an authentication result, wherein, the authentication result is a successful match, and the portion of the image is authenticated.