Qualcomm incorporated (20240193246). MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE simplified abstract
Contents
- 1 MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Image Authentication for Secure Boot
- 1.13 Original Abstract Submitted
MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE
Organization Name
Inventor(s)
Aneesh Bansal of San Diego CA (US)
Priyanka Dosi of San Diego CA (US)
Ghanashyam Prabhu of San Diego CA (US)
MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240193246 titled 'MODIFIED SECURE BOOT TECHNIQUE USING PRE-LOADED EXPECTED TAG IMAGE
Simplified Explanation
The patent application describes a process for image authentication for secure boot, ensuring that the image loaded into memory is authentic and secure.
- Obtaining an expected tag image with a corresponding tag for the image to be loaded into memory.
- Loading the expected tag into a hardware memory authenticator.
- Loading the image into memory.
- Triggering the hardware memory authenticator to authenticate the image.
- Reading a portion of the image and generating an authentication tag.
- Comparing the authentication tag with the expected tag for authentication.
Key Features and Innovation
- Secure boot process for image authentication.
- Use of hardware memory authenticator for authentication.
- Comparison of authentication tags for verification.
Potential Applications
This technology can be applied in secure boot processes for various devices such as computers, smartphones, and IoT devices.
Problems Solved
Ensures that only authentic images are loaded into memory during the boot process, preventing unauthorized access and tampering.
Benefits
- Enhanced security for boot processes.
- Protection against unauthorized access and malware attacks.
- Ensures the integrity of the loaded images.
Commercial Applications
Secure boot processes in computers, smartphones, IoT devices, and other electronic systems can benefit from this technology to enhance security and prevent unauthorized access.
Prior Art
Prior research in image authentication and secure boot processes can provide insights into similar technologies and approaches.
Frequently Updated Research
Stay updated on advancements in hardware memory authentication and secure boot processes to enhance the effectiveness and security of image authentication technologies.
Questions about Image Authentication for Secure Boot
How does image authentication for secure boot enhance system security?
Image authentication for secure boot ensures that only authentic images are loaded into memory, preventing unauthorized access and potential security breaches.
What are the potential applications of image authentication for secure boot beyond computers and smartphones?
Image authentication for secure boot can be applied in various electronic devices, including IoT devices, to enhance security and protect against unauthorized access.
Original Abstract Submitted
systems and techniques are provided for image authentication for secure boot. for example, a process for image authentication for secure boot can include: obtaining an expected tag image comprising an expected tag corresponding to an image to be loaded into memory; loading the expected tag into a first memory region corresponding to a hardware memory authenticator; loading, by the memory controller, the image into a second memory region; providing an authentication indication to the hardware memory authenticator, wherein the authentication indication triggers the hardware memory authenticator to authenticate the image; reading a portion of the image from the second memory region; generating, at the hardware memory authenticator, an authentication tag corresponding to the portion of the image; and performing a comparison of the authentication tag and the expected tag to obtain an authentication result, wherein, the authentication result is a successful match, and the portion of the image is authenticated.