WO2009108371A1 - A computer system comprising a secure boot mechanism - Google Patents
A computer system comprising a secure boot mechanism Download PDFInfo
- Publication number
- WO2009108371A1 WO2009108371A1 PCT/US2009/001289 US2009001289W WO2009108371A1 WO 2009108371 A1 WO2009108371 A1 WO 2009108371A1 US 2009001289 W US2009001289 W US 2009001289W WO 2009108371 A1 WO2009108371 A1 WO 2009108371A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- boot
- memory
- volatile memory
- instructions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
Definitions
- the present disclosure generally relates to the field of computer systems of enhanced integrity and corresponding mechanisms implemented therein, which may enable the provision of enhanced security standards, thereby enhancing efficiency of applications requiring a secure computer platform.
- significant damage may be created in private environments, and in particular in the industry, by introducing software applications which may, for instance, manipulate software files such as stored data, communicate information via the internet without knowledge of the actual user of the platform, start a denial of service attack, thereby possibly rendering the platform to be no longer usable for a dedicated application requiring a specific status of the platform.
- software applications which may, for instance, manipulate software files such as stored data, communicate information via the internet without knowledge of the actual user of the platform, start a denial of service attack, thereby possibly rendering the platform to be no longer usable for a dedicated application requiring a specific status of the platform.
- a plurality of encryption techniques are available, such as symmetric or asymmetric encryption/decryption techniques which enable the exchange of data with a high degree of resistance against tampering data by a third party during the transmission and storage of data.
- a pair of a private key and a public key may be used for encrypting data by means of one of the keys and deciphering the data by using the other key, wherein one of the keys may be publicly accessible.
- these techniques may provide enhanced integrity in data communication and data storage, the actual configuration of a computer platform under consideration may still provide the possibility of a plurality of attacks, in particular, as many applications intended for increasing computer security may rely on a trusted platform configuration.
- a trusted computer platform may be considered as a computer system in which the hardware configuration as well as the software applications may be assumed to be in a dedicated configuration.
- a secure platform configuration may be established only by establishing a "chain" of trusted platform levels, wherein each subsequent level may be initialized by the preceding level only, if the integrity of the subsequent level has been verified.
- the integrity at system level may be preserved through a chain of integrity verifications wherein a root of the chain of verification steps may have to be provided with a high degree of tamper resistance so as to also accomplish a high confidence with respect to integrity of the system after initializing the highest level, i.e., the level of user applications.
- the initialization of the system requires various degrees of abstraction, for example with respect to initializing the central processing unit (CPU), initializing the system memory, which is typically provided externally to the CPU, loading an operating system into the system memory from an external mass storage device, and finally executing user applications.
- CPU central processing unit
- system memory which is typically provided externally to the CPU
- loading an operating system into the system memory from an external mass storage device and finally executing user applications.
- the various system activities prior to loading the operating system can be considered to be secure so as to rely on the integrity of the operating system and the user application, since the operating system may be invoked by a "mistrusted" process, thereby providing the opportunity of manipulating the basic platform configuration by modifying hardware and software components.
- boot strapping the process of initializing the various hardware components of the computer system, such as the system memory and the execution of the instructions contained therein for initializing the higher system levels, which may also be referred to as boot strapping or booting, may have to be incorporated into the chain of trust to provide enhanced overall system integrity.
- a typical start sequence for initializing a computer system after applying power or after a reset event causes a "power on self-test" of the CPU, wherein also the processor starts execution of instructions at a dedicated entry address that is indicated by the processor's reset vector.
- BIOS basic input/output system
- BIOS basic input/output system
- the remaining self-test may be performed and the hardware configuration of the platform may be determined or "measured.”
- a search for a bootable device may be performed, such as a mass storage device, for instance the hard disk of the computer system, a disk, a CD-ROM, an extension card and the like, from which a primary boot block may be loaded into the system memory, wherein control is then passed to the primary boot block, which may load an operating system into the system memory.
- the present disclosure is directed to various devices and methods that may avoid, or at least reduce, the effects of one or more of the problems identified above.
- the present disclosure relates to devices and mechanisms for enhancing integrity of computer systems by establishing a static root of trust for measurement in that a certain set of data is provided that may include executable instructions and data values, which may be accessed by the microprocessor at start up in any case without providing the possibility of circumventing access to the dedicated data set so that a defined root for the initialization of the platform is obtained.
- the set of data is implemented in such a manner that a high level of resistance against any attacks for manipulation may be achieved.
- the corresponding routine may not be changed or interrupted, thereby providing a high degree of integrity of this set of data, which may thus be considered as a pre-boot set of instructions and data values.
- a chain of trusted software may be started, thereby enabling establishment of a high degree of system integrity, since the dedicated set of pre- boot data represents the static core root for the chain of subsequent verification steps.
- the pre-boot data set may be maintained in a non-volatile memory in the CPU core itself, thereby substantially avoiding any attacks with respect to replacing BIOS chips and the like.
- One illustrative method disclosed herein relates to starting a computer system.
- the method comprises accessing a first set of data stored in a non-volatile memory area of a central processing unit (CPU), wherein the first set of data includes first instructions causing a core circuit of the CPU to initialize a random access memory of the CPU.
- the method further comprises loading an image of a second set of data from a non-volatile memory into the initialized random access memory, wherein the second set of data comprises a signature for verifying integrity of the second set of data and further comprises second instructions that cause the CPU to initialize a system memory of the computer system.
- the method comprises verifying the integrity of the second set of data by using the signature and a decryption key included in the first set of data.
- the method comprises initializing the system memory using the second instructions when verification of the second set of data has been successful.
- a further illustrative method disclosed herein relates to starting a computer system and comprises, upon at least one of a power-up event and a reset event, accessing an internal non- volatile memory of a CPU.
- the non-volatile memory contains pre-boot instructions and data values for initializing an internal random access memory of the CPU and for verifying an integrity of at least a portion of boot instructions and boot data values stored in a non- volatile memory of the computer system.
- the method further comprises loading the portion of the boot instructions and boot data values from the non- volatile memory into the internal random access memory by executing the pre-boot instructions.
- integrity of at least a portion of the boot instructions and boot data values is verified by executing the pre- boot instructions.
- the method comprises, after successfully verifying integrity of the at least a portion of the boot instructions and boot data values, executing the boot instructions.
- One illustrative central processing unit (CPU) disclosed herein comprises a substrate having formed thereon circuit elements defining a CPU core, a random access memory, a non-volatile memory and a bus system for connecting the CPU core, the random access memory and the non-volatile memory. Furthermore, the CPU comprises pre-boot information stored in the non-volatile memory, wherein the pre-boot information includes instructions executable by the CPU core and also comprises data values for initializing the volatile random access memory and verifying at least a portion of a boot routine to be supplied from an external memory device.
- the central processing unit described above may be a part of a computer system comprising, in addition to the CPU, a system memory, a memory device containing the boot routine and an interface system for connecting the system memory and the memory device including the boot routine with the CPU.
- FIG. 1 schematically illustrates a central processing unit (CPU) including a random access memory (cache), a CPU core and a non-volatile memory including pre-boot information, according to illustrative embodiments;
- CPU central processing unit
- cache random access memory
- non-volatile memory including pre-boot information
- Figure Ib schematically illustrates a computer system including a CPU including internal pre-boot information, according to other illustrative embodiments;
- Figure Ic schematically illustrates process steps for manipulating bootstrap data including instructions and data values during a process for creating a signature of a first portion of the boot information, according to illustrative embodiments;
- Figure Id schematically illustrates a process for verifying a signature of a portion of the boot information, according to illustrative embodiments
- Figure 1 e illustrates a flow diagram for describing operation of the computer system as shown in Figure Ib, according to one illustrative embodiment
- FIG. If illustrates a flow diagram describing operation of a computer system including a CPU, such as the CPU of Figure Ia, according to still other illustrative embodiments.
- the present disclosure provides a system and a mechanism for executing, at start up or reset or any other operational state requiring an initialization of the system, instructions and using data stored in a non-volatile memory representing a part of a central processing unit, thereby significantly reducing the possibility of manipulating the set of data included in the non- volatile memory. Consequently, the contents of the non- volatile memory may be used as a static root of trust for measurement during the initialization of the CPU and the entire computer system by ensuring that, upon power-up or reset of the CPU, the first instruction is fetched from the non-volatile memory.
- the set of data contained therein may serve as a pre-boot or pre-BIOS component which may enable the initialization of further system components, such as an internal random access memory, which may be used for storing operational data like variables and stack and instructions for running a portion of BIOS software.
- the data cache as part of the random access memory area and an instruction cache may be initialized by the pre-boot data of the internal non-volatile memory, thereby substantially avoiding the possibility of external access to data contained therein during the initialization process. That is, the random access memory area, i.e., the data cache and the instruction cache, are CPU-internal components and unwanted manipulation may be very difficult, in particular as the external system memory is not initialized at this stage.
- the BIOS routine may be divided into two or more portions such that verification of one or more signatures in view of BIOS integrity may be performed in the random access memory for the first portion that is configured to have a size so as to fit into the instruction cache.
- this portion of the boot information may, after verifying the integrity thereof, be executed directly from the random access memory. Consequently, during initialization of the random access memory and loading the portion of the boot information by executing the pre-boot instructions, the pre-boot information may not be accessed externally, thereby substantially avoiding any manipulation of the first signature verification process.
- the pre-boot information may be accessed after signature verification by an external application, for instance for accessing decryption keys for evaluating the integrity of BIOS upgrade versions and the like.
- the data i.e., the instructions and data values, contained in the non- volatile memory provided as an integral part of the CPU may be used as a static core root of trust for measurement, thereby providing a computer platform in which a tamper-resistant hardware and software configuration may be achieved.
- the mechanism of embodiments disclosed herein may provide enhanced security for typical practical applications which use the platform in the context of financial transactions or digital rights management, which may be based on the requirement of a trustworthy computer platform.
- FIG. Ia schematically illustrates a central processing unit (CPU) 100 according to illustrative embodiments in which a core root of trust for measurement (CRTM) is implemented with a high degree of tamper resistance.
- the CPU 100 may comprise a CPU core 102 which may include components for data processing, such as performing arithmetic operations, logic operations and the like.
- the CPU core 102 is functionally connected to a random access memory 101 which may comprise a plurality of static RAM cells and the like, as is compatible with the overall configuration of the CPU 100.
- the RAM 101 may comprise a first memory portion, also indicated as data cache 101 A, and a second portion indicated as instruction cache 101 B.
- the RAM 101 may be implemented in a fast memory technology to enhance the overall performance of the CPU 100, as is typically required in sophisticated integrated circuits. It should be appreciated, however, that any appropriate memory technology may be used for the memory 101 as long as direct control of the memory 101 via the CPU core 102 may be accomplished without the possibility of external access during initialization of the CPU 100.
- the CPU 100 may comprise a non- volatile memory 103, which may be provided in any appropriate memory technology, for instance in the form of a flash memory or any other read-only memory technique, which may not enable external access for modifying the contents of the memory 103.
- the memory 103 may be considered as a secure memory area, the contents of which may therefore represent a static root of trust.
- a set of data 103 A which is to be understood as instructions executable by the CPU core 102 and data values representing operands and the like of the instructions, is provided, at least in a portion of the memory 103, which may not be overwritten with new data once the respective portion of the memory 103 is programmed.
- the memory 103 containing the set of data 103 A may be connected to the CPU core 102 by means of a bus system 104 such that, upon power-up or reset, a jump to a specified address of the memory 103 is performed. Consequently, a "hard- wired" target for a reset vector of the CPU core 102 may be provided which ensures that execution of instructions may start from the secure memory 103, at least for a power-up event and a reset event.
- the CPU 100 may be formed on the basis of sophisticated semiconductor manufacturing techniques in which an appropriate carrier material, such as a semiconductor substrate and the like, may receive a plurality of circuit elements formed on the basis of a technology under consideration, such as CMOS processes and the like, in which transistor elements, capacitors, resistors and the like may be formed in accordance with a specific device architecture for the CPU 100.
- the various components of the CPU 100 may therefore be formed on a common substrate during a common manufacturing process flow, thereby providing the memories 101 and 103 as internal or integral components of the device 100.
- respective manufacturing techniques are well established in which volatile and fast memory cells may be formed together with non-volatile memory cells and high performance logic gates as may be required in the CPU core 102.
- FIG. Ib schematically illustrates a computer system 150 comprising the CPU 100 providing the protected environment for the set of data 103 A, as previously explained, wherein, in the embodiment shown, the CPU 100 may comprise the random access memory 101 in the form of the data cache 101 A and the instruction cache 101 B, which may have a size of, for example, 64 kB so as to accommodate a portion of boot information and to act as a "system RAM" when performing instructions of the data set 103 A.
- the instruction cache 101 B may be provided with a size of 64 kB, wherein it should be appreciated that any other appropriate memory size may be used that is compatible with the size of a respective portion of boot information that is to be performed from the memory 101 during a verification process.
- the internal non- volatile memory 103 may be provided with any appropriate size, for instance 32k, so as to be compatible with the requirements for the data 103 A representing the core root of trust for measurement for the computer system 150.
- the set of data 103 A may comprise instructions and data values representing a secure load routine for loading a respective portion of boot information into the internal memory 101 for performing a verification process.
- the set of data 103 A may comprise one or more decryption keys which may represent public keys of an asymmetric encryption/decryption algorithm so as to enable a signed portion of the boot information to be verified within the memory 101. It should be appreciated that the number of public keys in the data set 103 A may be selected in accordance with safety considerations, for instance in view of maintaining an appropriate infrastructure for providing respective key pairs with a high degree of integrity and the like.
- the computer system 150 may further comprise a system memory 1 10, for instance in the form of any appropriate memory device including random access memory cells, such as dynamic RAM cells and the like.
- the size of the system memory 110 may be adapted to the requirements of the system 150 in view of performance and storage capacity.
- the system 150 may comprise a non- volatile memory 120, such as a flash memory and the like, which may include information, also referred to as BIOS information, at least a portion of which may be a signed portion, that is, the signed portion may comprise a signature obtained on the basis of an appropriate hash algorithm in combination with an encryption mechanism, for which one or more appropriate decryption keys may be contained in the set of data 103 A, as previously explained.
- the non- volatile memory 120 may contain the boot information that is divided into two portions, wherein a first portion may comprise data and instructions for initializing other system components, such as the system memory 110, for accommodating the second portion of boot information and executing the second portion once the first portion has been verified on the basis of the protected environment provided by the CPU 100.
- a first portion may comprise data and instructions for initializing other system components, such as the system memory 110, for accommodating the second portion of boot information and executing the second portion once the first portion has been verified on the basis of the protected environment provided by the CPU 100.
- the computer system 150 may further comprise an interface system 140 configured to operatively connect the system memory 1 10 and the non- volatile memory 120 with the CPU 100.
- the system 150 may further comprise a one-time programmable memory 130, which may include platform-specific information, for instance about boot sources and related parameters.
- the one-time programmable memory 130 may comprise information concerning boot options in order to indicate to the CPU 100 whether to boot from the internal memory 103 or not.
- security bits provided in the memory 130 may include a respective bit that determines where the initial instruction fetch of the CPU 100 after reset is rooted to. For example, with this bit set to "1," execution may be passed to the internal memory 103, thereby enabling secure boot processing.
- the secure boot functionality may be desirable for development/debug purposes. In other cases, depending on platform requirements, it may also be desirable to disable or bypass trusted platform security features. In this case, a change of the state of this bit may not be allowable during the secure boot processing. For this purpose, all debug modes (JTAG, ...) are disabled at least during the boot time. After disabling respective debug modes, execution of the secure boot process may be performed, as will be described later on in more detail. Similarly, the memory 130 may include a bit for controlling debug features during the secure boot process, which may be advantageous during development periods, while, for production, a respective control of debug features is to be disabled.
- the memory 130 may comprise other information, such as the vendor identification or any unique number which may be usable for digital rights management applications and the like. It should be appreciated that, in other illustrative embodiments, the one-time programmable memory 130 may be omitted or may be provided so as to include other information controlling the secure boot processing during development and actual application.
- Figure Ic schematically illustrates the configuration of boot information 121 that may be stored in the non- volatile memory 120.
- the boot information 121 which may also be referred to as BIOS, may comprise a first portion 121 A, which may represent a set of data including instructions and data values having a size so as to be compatible with the size of the memory 101, as previously explained.
- a maximum size of the portion 121 A may be restricted to approximately 32 kB. It should be appreciated, however, that any other appropriate size of the portion 121 A may be applied, depending on the available amount of storage within the RAM 101. It should further be appreciated that providing the portion 121 A may be necessary for boot information 121 which exceeds the size of the memory 101 so that the entire boot processing may not be performed on the basis of the memory 101 since typical boot routines may have a size of several hundred kByte and more. In other cases, when sufficient storage space may be available, the boot information 121 as a whole may be used during the secure boot processing, as will be discussed later on in more detail.
- the portion 12 IA may serve as an initial BIOS "loader" for a second portion 121B, wherein the first portion 121 A may contain therein a hash value obtained over the portion 121 B.
- the hash value for the portion 121B may also be protected by the signature contained in the portion 121 A on the basis of a hash value obtained over the first portion 12 IA, which may be accomplished in a dedicated trust center. Thus, encryption of the hash value of the second portion may not be necessary.
- the signature of the hash value(s) for the portion 121 A may be used for verifying the portion 12 IA during a secure boot processing.
- the portion 121 A may therefore be configured to perform necessary platform initialization actions, such as initialization of a memory controller and the like, followed by shadowing the portion 12 IB from the memory 120 into the initialized system memory 110.
- a hash value may also be calculated over the image 121B copied into the system memory 110, which may then be compared with the hash value initially contained in the portion 121 A.
- integrity of the portion 12 IB may be verified on the basis of the hash value contained in the portion 121 A, thereby providing a trusted chain of integrity. Consequently, as shown in Figure Ic, the portion 121 A may be processed so as to obtain a signature, which may be accomplished in an appropriate trust center on the basis of an appropriate trustworthy environment.
- secure hash algorithms may be applied to provide one or more hash values, for instance indicated as hash 0, hash 1, hash 2 in combination with appropriate control data.
- any appropriate encryption technique may be used, for instance an RSA (Ri vest, Schamir, Adelman) algorithm using appropriate private keys, thereby obtaining the encrypted hash values as indicated at the right-hand side of Figure Ic.
- an appropriate number of public keys may be contained in the data set 103 A thereby enabling a decryption of the encrypted hash values or signatures created during the sequence as shown in Figure 1 c.
- Figure Id schematically illustrates a sequence for verifying the signatures contained in the portion 121 A, which may be performed on the basis of the data set 103 A during start up of the system 150.
- the verification may be accomplished on the basis of, for example, the RSA algorithm using a public key, thereby obtaining the initially created hash values, such as hash 0, hash 1, hash 2.
- These initially created hash values may then be compared to respective hash values as may be obtained by applying the appropriate hash algorithm over the portion 121 A that is copied into the RAM memory 101.
- the portion 121 A may then be considered as verified if the calculated hash value(s) match with the initially generated hash value(s) obtained by decrypting the signatures in the portion 121 A, as shown at the left-hand side of Figure Id.
- a static root of trust may have to be implemented so as to enable a secure start up of an operating system after power- up or reset of the computer system under consideration.
- a defined execution of the trusted BIOS information 121 may be accomplished by verifying at least the portion 121 A on the basis of the trusted set of data 103 A, which is substantially resistant against any external manipulation.
- the portions 121 A, 121B upon verifying the integrity of the boot information 121, i.e., in the embodiments shown, the portions 121 A, 121B, integrity of the entire boot process may be confirmed, thereby enabling a trusted initialization of an operating system which in turn may be used for performing security sensitive applications.
- an appropriate policy may be applied, for instance, to limit the services provided by the system or, in other illustrative embodiments, by actually disabling the boot processing.
- the secure boot architecture disclosed herein may protect against "class breaks" which are to be understood as attacks that will work against every instance of a given security system.
- class break a piece of software generated by an external source may be considered as class break, which may be easy to install and enable circumvention of security/protective measures, thereby enabling unauthorized use of the platform.
- DRM digital rights management
- a class break may already be given when the DRM protected data file may be broken once, thereby enabling a redistribution of the unprotected file.
- mechanisms and systems disclosed herein may provide enhanced security with respect to class breaks, since protected environments may be obtained on the basis of an integral portion within the CPU itself, thereby requiring manipulation of the CPU itself, or respective deficiencies in the infrastructure for signing the boot information and maintaining the secret keys, which in both cases may require significant effort in terms of time and money.
- FIG. 1e schematically illustrates a flow diagram for describing operation of the system 150.
- the system 150 may be reset or power may be supplied thereto or any other event may occur that may require a secure boot processing. Consequently, an appropriate self-test may be performed by the CPU core 102 and respective components, such as registers and the like, may be initialized. It should be appreciated that, in some embodiments, a secure boot processing may not be enabled, an operating state in which the operating system may stay in control of the system 150.
- the first instruction is fetched from the internal non- volatile memory 103 which may be accomplished by mapping the internal memory 103 to the corresponding reset vector address.
- the CPU 100 starts execution on the basis of the secure data set 103 A in any instances in which a jump to the reset vector is caused by any external event, hi step S 120, the internal random access memory 101 may be initialized caused by the execution of the instructions contained in the set 103 A.
- the boot information 121 for instance the portion 121a including a signature thereof, may be loaded into the internal random access memory 101.
- integrity of the boot information 121 or the portion 12 IA may be verified by using a decryption key contained in the data set 103 A. That is, after initializing the memory 101, the signature check for the boot information 121, or at least the portion 121 A, is started.
- hash values may be calculated on the basis of secure hash algorithms, such as SHAl wherein the one or more signatures for the boot information 121 or the portion 12 IA may be skipped.
- additional information such as the vendor identification contained in the one time programmable memory 130, may be used in some cases and may be included for calculating one or more hash values.
- the one or more calculated hash values may then be compared to the one or more hash values contained in a dedicated location of the data 121 or 121 A, as is also previously described with reference to Figure Ib.
- the hash values from the one or more signatures may be retrieved using the public decryption keys contained in the data set 103 A, so as to obtain the initial hash values. If both the calculated hash values and the initial hash values match, the boot information 121, or the portion 12 IA, is considered trustworthy in step S 150, and boot processing is continued in step S 160. If the integrity check fails in step S 150, in step S 170, a corresponding boot failure may be indicated which, in one illustrative embodiment, may be accompanied by terminating the boot processing and issuing a corresponding error code.
- the secure boot process i.e., the process flow represented by the steps Sl 00-Sl 50, may not apply any reset procedures to any components of the system 150, thereby enabling reliable "measurement" of the hardware configuration of the system 150.
- FIG. 1 f schematically illustrates a secure boot processing according to still other illustrative embodiments.
- step SlOl it may be decided whether or not a secure boot processing is enabled.
- a respective indication may be obtained by setting respective security bits contained in the memory 130.
- step SlOO execution is started from the non- volatile memory 103, as previously explained.
- step S 102 status information may be provided, for instance, for appropriately setting an output port.
- step S 102 it may be indicated that secure boot processing is started during the internal self-test.
- the system 150 and in particular the CPU 100 may be initialized, which may, for instance, comprise one or more of the steps S 121 -S 129.
- step S121 the addresses of the memory 103 may be appropriately remapped so as to ensure that the very first instruction will be fetched from the memory 103.
- step S 122 a boot source may be detected and may be initialized in step S 123.
- the memory 101 i.e., the data cache 101A and the instruction cache 101B, may be initialized in steps S124, S125, and unreal mode for the data cache may be set up in step S 126.
- an image of the boot information 121 or of the portion 121 A may be copied into the data cache 101 A and, in step S 128, storage space may be assigned for variables in the data cache 101 A.
- step S 129 the vendor identification may be retrieved.
- step S 141 a block of the boot information 121 or portion 121 A is read and, in step S 142, a respective hash algorithm may be performed so as to obtain a first hash value.
- step S 143 it is determined whether or not the previously read block of data was the last block or not. If not, the process flow moves back to step S 141 to read in a further block of data and in the subsequent step S 142 a hash value is calculated and updates the previously obtained value.
- step S 143 the last block is read, in step S 144, the computed hash value is stored and, in step S145, a relevant portion of the data 121 or 121 A may be read so as to obtain the signatures contained therein.
- the header block of the information 121 or of the portion 121 A may be used for this purpose.
- step S 146 the one or more signatures are retrieved and, in step S 147, one or more public keys are applied to decipher the signatures obtained in step S 146.
- step S 150 the hash value or values stored in step S 144 may be compared with the original hash values obtained by performing step S 147, thereby deciding whether the data 121 or 121 A are considered trustworthy or not.
- step S 150 the previously initialized instruction cache may be updated with the boot data 121 or 12 IA, which is presently contained in the data cache 101 A, so as to verify the boot data therein.
- step S 162 the status of the secure boot process may be indicated and finally, in step 163, the booting may be continued by performing instructions from the instruction cache, which may, for instance, include initialization of the system memory 110, the retrieval of any remaining portion of the boot data 121, such as the portion 121B, and the verification of the integrity thereof by calculating a hash value and comparing the calculated hash value with an original hash value included in the portion 121 A.
- a corresponding status information for example, OxCD
- step S 172 in one illustrative embodiment, execution may be terminated.
- the systems and mechanisms disclosed herein provide enhanced integrity of computer platforms by providing a secure boot processing on the basis of a pre-boot routine contained in a non-volatile memory, which may not be overwritten once data are programmed into the non-volatile memory. Since the non-volatile memory is a part of the CPU itself, system initialization may be accomplished on the basis of the pre-boot information stored in the non-volatile internal memory, which may also include appropriate decryption keys that may be applied to a signed boot information or at least to a signed portion of the boot information.
- the process for calculating appropriate hash values for the boot information or a portion thereof and a comparison with originally created values stored in encrypted form in the boot information may be accomplished by using the internal random access memory of the CPU, thereby preventing the possibility of external access and thus the possibility of manipulating the system configuration.
- the internally stored pre-boot information may be used as a core root of trust for measurement during system initialization.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010548742A JP2011527777A (en) | 2008-02-29 | 2009-02-27 | Computer system with a secure startup mechanism |
KR1020107021808A KR101237527B1 (en) | 2008-02-29 | 2009-02-27 | A computer system comprising a secure boot mechanism |
EP09716112A EP2250599A1 (en) | 2008-02-29 | 2009-02-27 | A computer system comprising a secure boot mechanism |
CN200980106728XA CN101965570B (en) | 2008-02-29 | 2009-02-27 | A computer system comprising a secure boot mechanism |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008011925.3A DE102008011925B4 (en) | 2008-02-29 | 2008-02-29 | Safe initialization of computer systems |
DE102008011925.3 | 2008-02-29 | ||
US12/186,821 US8656146B2 (en) | 2008-02-29 | 2008-08-06 | Computer system comprising a secure boot mechanism |
US12/186,821 | 2008-08-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009108371A1 true WO2009108371A1 (en) | 2009-09-03 |
Family
ID=40911374
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2009/001289 WO2009108371A1 (en) | 2008-02-29 | 2009-02-27 | A computer system comprising a secure boot mechanism |
Country Status (8)
Country | Link |
---|---|
US (1) | US8656146B2 (en) |
EP (1) | EP2250599A1 (en) |
JP (1) | JP2011527777A (en) |
KR (1) | KR101237527B1 (en) |
CN (1) | CN101965570B (en) |
DE (1) | DE102008011925B4 (en) |
TW (1) | TWI498768B (en) |
WO (1) | WO2009108371A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9235710B2 (en) | 2013-05-23 | 2016-01-12 | Cisco Technology, Inc. | Out of band management of basic input/output system secure boot variables |
US11514167B2 (en) | 2020-02-12 | 2022-11-29 | Realtek Semiconductor Corporation | Computer system having firmware verification mechanism and firmware verification method of the same |
Families Citing this family (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9582676B2 (en) * | 2005-01-31 | 2017-02-28 | Unisys Corporation | Adding or replacing disks with re-key processing |
US8522066B2 (en) * | 2010-06-25 | 2013-08-27 | Intel Corporation | Providing silicon integrated code for a system |
US8812828B2 (en) * | 2010-11-16 | 2014-08-19 | Intel Corporation | Methods and apparatuses for recovering usage of trusted platform module |
US8560845B2 (en) * | 2011-01-14 | 2013-10-15 | Apple Inc. | System and method for tamper-resistant booting |
US20120204254A1 (en) * | 2011-02-04 | 2012-08-09 | Motorola Mobility, Inc. | Method and apparatus for managing security state transitions |
WO2013067486A1 (en) | 2011-11-04 | 2013-05-10 | Insyde Software Corp. | Secure boot administration in a unified extensible firmware interface (uefi)- compliant computing device |
JP5441984B2 (en) * | 2011-11-08 | 2014-03-12 | シャープ株式会社 | Electronic device system, electronic device and storage medium |
US8775784B2 (en) | 2011-11-11 | 2014-07-08 | International Business Machines Corporation | Secure boot up of a computer based on a hardware based root of trust |
US20130173906A1 (en) * | 2011-12-29 | 2013-07-04 | Eric T. Obligacion | Cloning storage devices through secure communications links |
US9262637B2 (en) * | 2012-03-29 | 2016-02-16 | Cisco Technology, Inc. | System and method for verifying integrity of platform object using locally stored measurement |
WO2013165383A1 (en) | 2012-04-30 | 2013-11-07 | Hewlett-Packard Development Company, L.P. | Configurable computer memory |
US9047471B2 (en) * | 2012-09-25 | 2015-06-02 | Apple Inc. | Security enclave processor boot control |
US8873747B2 (en) | 2012-09-25 | 2014-10-28 | Apple Inc. | Key management using security enclave processor |
CN102929674B (en) | 2012-11-02 | 2016-02-10 | 威盛电子股份有限公司 | Electronic installation and starting-up method |
US9881161B2 (en) | 2012-12-06 | 2018-01-30 | S-Printing Solution Co., Ltd. | System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof |
US20140164753A1 (en) * | 2012-12-06 | 2014-06-12 | Samsung Electronics Co., Ltd | System on chip for performing secure boot, image forming apparatus using the same, and method thereof |
US10733288B2 (en) | 2013-04-23 | 2020-08-04 | Hewlett-Packard Development Company, L.P. | Verifying controller code and system boot code |
EP2989579B1 (en) * | 2013-04-23 | 2018-06-06 | Hewlett-Packard Development Company, L.P. | Redundant system boot code in a secondary non-volatile memory |
KR101656092B1 (en) * | 2013-08-13 | 2016-09-08 | 윈본드 일렉트로닉스 코포레이션 | Secured computing system with asynchronous authentication |
US9798880B2 (en) * | 2013-11-13 | 2017-10-24 | Via Technologies, Inc. | Fuse-enabled secure bios mechanism with override feature |
US10055588B2 (en) | 2013-11-13 | 2018-08-21 | Via Technologies, Inc. | Event-based apparatus and method for securing BIOS in a trusted computing system during execution |
US9367689B2 (en) * | 2013-11-13 | 2016-06-14 | Via Technologies, Inc. | Apparatus and method for securing BIOS in a trusted computing system |
US9779243B2 (en) * | 2013-11-13 | 2017-10-03 | Via Technologies, Inc. | Fuse-enabled secure BIOS mechanism in a trusted computing system |
US9767288B2 (en) * | 2013-11-13 | 2017-09-19 | Via Technologies, Inc. | JTAG-based secure BIOS mechanism in a trusted computing system |
US9183394B2 (en) | 2013-11-13 | 2015-11-10 | Via Technologies, Inc. | Secure BIOS tamper protection mechanism |
US9129113B2 (en) | 2013-11-13 | 2015-09-08 | Via Technologies, Inc. | Partition-based apparatus and method for securing bios in a trusted computing system during execution |
US9547767B2 (en) | 2013-11-13 | 2017-01-17 | Via Technologies, Inc. | Event-based apparatus and method for securing bios in a trusted computing system during execution |
US9507942B2 (en) * | 2013-11-13 | 2016-11-29 | Via Technologies, Inc. | Secure BIOS mechanism in a trusted computing system |
TWI560611B (en) * | 2013-11-13 | 2016-12-01 | Via Tech Inc | Apparatus and method for securing bios |
US9779242B2 (en) * | 2013-11-13 | 2017-10-03 | Via Technologies, Inc. | Programmable secure bios mechanism in a trusted computing system |
US10049217B2 (en) | 2013-11-13 | 2018-08-14 | Via Technologies, Inc. | Event-based apparatus and method for securing bios in a trusted computing system during execution |
US10095868B2 (en) | 2013-11-13 | 2018-10-09 | Via Technologies, Inc. | Event-based apparatus and method for securing bios in a trusted computing system during execution |
KR20150078644A (en) * | 2013-12-31 | 2015-07-08 | 에릭슨엘지엔터프라이즈 주식회사 | Method and apparatus for duplexing of software image |
KR102227263B1 (en) * | 2013-12-31 | 2021-03-15 | 삼성전자주식회사 | System and Method for Changing of Secure Boot and Electronic Apparatus Equipped the System Thereof |
KR20150085301A (en) * | 2014-01-15 | 2015-07-23 | 삼성전자주식회사 | Method of operating memory system and method of initializing memory system including the same |
CN104866757B (en) * | 2014-02-24 | 2019-01-15 | 联想(北京)有限公司 | A kind of verification method and electronic equipment |
CN106104561B (en) | 2014-03-28 | 2019-10-22 | 惠普发展公司,有限责任合伙企业 | Allow the method and apparatus for installing and using test key for BIOS |
CN105022589A (en) * | 2014-04-29 | 2015-11-04 | 光宝科技股份有限公司 | Electronic device and operation method thereof |
US9547778B1 (en) | 2014-09-26 | 2017-01-17 | Apple Inc. | Secure public key acceleration |
WO2016073411A2 (en) * | 2014-11-03 | 2016-05-12 | Rubicon Labs, Inc. | System and method for a renewable secure boot |
US11456876B2 (en) * | 2015-03-26 | 2022-09-27 | Assa Abloy Ab | Virtual credentials and licenses |
CN104866343A (en) * | 2015-05-15 | 2015-08-26 | 长城信息产业股份有限公司 | Security startup method for embedded equipment and securely-started embedded equipment |
CN104881345B (en) * | 2015-05-25 | 2018-10-23 | 上海兆芯集成电路有限公司 | The method of central processing unit and computer booting self-test |
CN104899524B (en) * | 2015-05-25 | 2018-11-27 | 上海兆芯集成电路有限公司 | The method of central processing unit and verifying motherboard data |
US10467418B2 (en) * | 2015-08-28 | 2019-11-05 | Ncr Corporation | Computer pre-boot security verification, enforcement, and remediation |
US9996711B2 (en) * | 2015-10-30 | 2018-06-12 | Intel Corporation | Asset protection of integrated circuits during transport |
CN105681032B (en) * | 2016-01-08 | 2017-09-12 | 腾讯科技(深圳)有限公司 | Method for storing cipher key, key management method and device |
US10242195B2 (en) * | 2016-07-22 | 2019-03-26 | Hewlett Packard Enterprise Development Lp | Integrity values for beginning booting instructions |
CN106484477B (en) * | 2016-10-11 | 2019-11-12 | 上海华虹集成电路有限责任公司 | The software download and starting method of safety |
US11455396B2 (en) * | 2017-05-12 | 2022-09-27 | Hewlett Packard Enterprise Development Lp | Using trusted platform module (TPM) emulator engines to measure firmware images |
EP3673401A4 (en) | 2017-08-22 | 2021-04-14 | Absolute Software Corporation | Firmware integrity check using silver measurements |
CN109714303B (en) | 2017-10-25 | 2022-05-27 | 阿里巴巴集团控股有限公司 | BIOS starting method and data processing method |
CN109710315B (en) | 2017-10-25 | 2022-05-10 | 阿里巴巴集团控股有限公司 | BIOS (basic input output System) flash writing method and BIOS mirror image file processing method |
US10757087B2 (en) * | 2018-01-02 | 2020-08-25 | Winbond Electronics Corporation | Secure client authentication based on conditional provisioning of code signature |
US11741233B2 (en) | 2018-06-11 | 2023-08-29 | Hewlett-Packard Development Company, L.P. | Overriding sub-system identifiers with protected variable values |
JP7059127B2 (en) * | 2018-06-26 | 2022-04-25 | キヤノン株式会社 | Information processing device that detects tampering with software executed at startup and its control method |
CN109446815B (en) * | 2018-09-30 | 2020-12-25 | 华为技术有限公司 | Management method and device for basic input/output system firmware and server |
WO2020159533A1 (en) | 2019-02-01 | 2020-08-06 | Hewlett-Packard Development Company, L.P. | Security credential derivation |
US10726133B1 (en) * | 2019-02-04 | 2020-07-28 | Dell Products L.P. | Securely loading UEFI images at runtime |
US11520662B2 (en) | 2019-02-11 | 2022-12-06 | Hewlett-Packard Development Company, L.P. | Recovery from corruption |
JP7286381B2 (en) * | 2019-04-01 | 2023-06-05 | キヤノン株式会社 | Information processing device and its control method |
US11347856B2 (en) * | 2019-05-24 | 2022-05-31 | Dell Products L.P. | Bios method to block compromised preboot features |
US11657157B2 (en) * | 2019-06-06 | 2023-05-23 | Macronix International Co., Ltd. | Secure boot system, method and apparatus |
CN114424166A (en) * | 2019-08-28 | 2022-04-29 | 惠普发展公司,有限责任合伙企业 | Encryption table signature |
CN113282930B (en) * | 2020-02-19 | 2024-03-01 | 瑞昱半导体股份有限公司 | Computer system with firmware verification mechanism and firmware verification method thereof |
US11768611B2 (en) | 2020-04-02 | 2023-09-26 | Axiado Corporation | Secure boot of a processing chip |
US11528276B2 (en) | 2020-04-16 | 2022-12-13 | Bank Of America Corporation | System for prevention of unauthorized access using authorized environment hash outputs |
US11423160B2 (en) | 2020-04-16 | 2022-08-23 | Bank Of America Corporation | System for analysis and authorization for use of executable environment data in a computing system using hash outputs |
US11263109B2 (en) | 2020-04-16 | 2022-03-01 | Bank Of America Corporation | Virtual environment system for validating executable data using accelerated time-based process execution |
US11481484B2 (en) | 2020-04-16 | 2022-10-25 | Bank Of America Corporation | Virtual environment system for secure execution of program code using cryptographic hashes |
US11425123B2 (en) | 2020-04-16 | 2022-08-23 | Bank Of America Corporation | System for network isolation of affected computing systems using environment hash outputs |
CN113553115B (en) * | 2020-04-23 | 2024-09-10 | 上汽通用汽车有限公司 | Starting method based on heterogeneous multi-core chip and storage medium |
FR3111441B1 (en) * | 2020-06-10 | 2022-08-05 | Proton World Int Nv | Secure start of an electronic circuit |
US11372982B2 (en) | 2020-07-02 | 2022-06-28 | Bank Of America Corporation | Centralized network environment for processing validated executable data based on authorized hash outputs |
US20230083979A1 (en) * | 2021-09-10 | 2023-03-16 | Ampere Computing Llc | Method and system for secure boot and rma intervention |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010007131A1 (en) * | 1997-09-11 | 2001-07-05 | Leonard J. Galasso | Method for validating expansion roms using cryptography |
US20050076226A1 (en) * | 2003-10-01 | 2005-04-07 | International Business Machines Corporation | Computing device that securely runs authorized software |
EP1659472A1 (en) * | 2004-11-22 | 2006-05-24 | Research In Motion Limited | Method and Device for Authenticating Software |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07146788A (en) * | 1993-11-22 | 1995-06-06 | Fujitsu Ltd | System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method |
JP3293760B2 (en) * | 1997-05-27 | 2002-06-17 | 株式会社エヌイーシー情報システムズ | Computer system with tamper detection function |
JPH1139158A (en) * | 1997-07-18 | 1999-02-12 | Nippon Telegr & Teleph Corp <Ntt> | Method for protecting executed program and its device |
JP2002366748A (en) * | 2001-06-05 | 2002-12-20 | Dainippon Printing Co Ltd | New account opening system using ic card |
US7974416B2 (en) * | 2002-11-27 | 2011-07-05 | Intel Corporation | Providing a secure execution mode in a pre-boot environment |
JP2004348677A (en) * | 2003-05-26 | 2004-12-09 | Sony Corp | Program and information processing method |
JP2005227995A (en) * | 2004-02-12 | 2005-08-25 | Sony Corp | Information processor, information processing method and computer program |
US8667580B2 (en) * | 2004-11-15 | 2014-03-04 | Intel Corporation | Secure boot scheme from external memory using internal memory |
US20060179308A1 (en) * | 2005-02-07 | 2006-08-10 | Andrew Morgan | System and method for providing a secure boot architecture |
US8291226B2 (en) * | 2006-02-10 | 2012-10-16 | Qualcomm Incorporated | Method and apparatus for securely booting from an external storage device |
CN1822013A (en) * | 2006-03-14 | 2006-08-23 | 上海一维科技有限公司 | Finger print biological identifying engine system and its identifying method based on credible platform module |
US7949863B2 (en) * | 2006-03-30 | 2011-05-24 | Silicon Image, Inc. | Inter-port communication in a multi-port memory device |
CN100504779C (en) * | 2006-06-30 | 2009-06-24 | 联想(北京)有限公司 | Method for accelerating BIOS operation |
CN1900939A (en) * | 2006-07-18 | 2007-01-24 | 上海一维科技有限公司 | Finger print biological identification device and it identification method of safety computer |
US8068614B2 (en) * | 2007-09-28 | 2011-11-29 | Intel Corporation | Methods and apparatus for batch bound authentication |
US8583908B2 (en) * | 2007-12-31 | 2013-11-12 | Intel Corporation | Enhanced network and local boot of Unified Extensible Firmware Interface images |
DE102008021567B4 (en) * | 2008-04-30 | 2018-03-22 | Globalfoundries Inc. | Computer system with secure boot mechanism based on symmetric key encryption |
-
2008
- 2008-02-29 DE DE102008011925.3A patent/DE102008011925B4/en not_active Expired - Fee Related
- 2008-08-06 US US12/186,821 patent/US8656146B2/en active Active
-
2009
- 2009-02-26 TW TW098106104A patent/TWI498768B/en active
- 2009-02-27 KR KR1020107021808A patent/KR101237527B1/en not_active IP Right Cessation
- 2009-02-27 JP JP2010548742A patent/JP2011527777A/en not_active Ceased
- 2009-02-27 EP EP09716112A patent/EP2250599A1/en not_active Withdrawn
- 2009-02-27 WO PCT/US2009/001289 patent/WO2009108371A1/en active Application Filing
- 2009-02-27 CN CN200980106728XA patent/CN101965570B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010007131A1 (en) * | 1997-09-11 | 2001-07-05 | Leonard J. Galasso | Method for validating expansion roms using cryptography |
US20050076226A1 (en) * | 2003-10-01 | 2005-04-07 | International Business Machines Corporation | Computing device that securely runs authorized software |
EP1659472A1 (en) * | 2004-11-22 | 2006-05-24 | Research In Motion Limited | Method and Device for Authenticating Software |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9235710B2 (en) | 2013-05-23 | 2016-01-12 | Cisco Technology, Inc. | Out of band management of basic input/output system secure boot variables |
US9773115B2 (en) | 2013-05-23 | 2017-09-26 | Cisco Technology, Inc. | Out of band management of basic input/output system secure boot variables |
US11068597B2 (en) | 2013-05-23 | 2021-07-20 | Cisco Technology, Inc. | Out of band management of basic input/output system secure boot variables |
US11775651B2 (en) | 2013-05-23 | 2023-10-03 | Cisco Technology, Inc. | Out of band management of basic input/output system secure boot variables |
US11514167B2 (en) | 2020-02-12 | 2022-11-29 | Realtek Semiconductor Corporation | Computer system having firmware verification mechanism and firmware verification method of the same |
Also Published As
Publication number | Publication date |
---|---|
US8656146B2 (en) | 2014-02-18 |
CN101965570A (en) | 2011-02-02 |
CN101965570B (en) | 2013-09-18 |
DE102008011925B4 (en) | 2018-03-15 |
TWI498768B (en) | 2015-09-01 |
DE102008011925A1 (en) | 2009-09-03 |
KR101237527B1 (en) | 2013-02-26 |
JP2011527777A (en) | 2011-11-04 |
EP2250599A1 (en) | 2010-11-17 |
US20090222653A1 (en) | 2009-09-03 |
KR20100125371A (en) | 2010-11-30 |
TW200943123A (en) | 2009-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8656146B2 (en) | Computer system comprising a secure boot mechanism | |
US8464037B2 (en) | Computer system comprising a secure boot mechanism on the basis of symmetric key encryption | |
US11089016B2 (en) | Secure system on chip | |
JP5378460B2 (en) | System and method for protected operating system boot using state verification | |
US9910991B2 (en) | Event-based apparatus and method for securing bios in a trusted computing system during execution | |
US8006095B2 (en) | Configurable signature for authenticating data or program code | |
US7139915B2 (en) | Method and apparatus for authenticating an open system application to a portable IC device | |
US7010684B2 (en) | Method and apparatus for authenticating an open system application to a portable IC device | |
TWI567580B (en) | Method and system for preventing execution of malware | |
US9183394B2 (en) | Secure BIOS tamper protection mechanism | |
EP2854066A1 (en) | System and method for firmware integrity verification using multiple keys and OTP memory | |
EP2874091B1 (en) | Partition-based apparatus and method for securing bios in a trusted computing system during execution | |
EP2874092B1 (en) | Recurrent BIOS verification with embedded encrypted hash | |
US20040151319A1 (en) | Method and apparatus for managing a hierarchy of nodes | |
JP4791250B2 (en) | Microcomputer and its software falsification prevention method | |
EP3440586B1 (en) | Method for write-protecting boot code if boot sequence integrity check fails | |
US7913074B2 (en) | Securely launching encrypted operating systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980106728.X Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09716112 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009716112 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 5255/CHENP/2010 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010548742 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 20107021808 Country of ref document: KR Kind code of ref document: A |