WO2013101081A1 - Methods and apparatus for trusted boot optimization - Google Patents
Methods and apparatus for trusted boot optimization Download PDFInfo
- Publication number
- WO2013101081A1 WO2013101081A1 PCT/US2011/067873 US2011067873W WO2013101081A1 WO 2013101081 A1 WO2013101081 A1 WO 2013101081A1 US 2011067873 W US2011067873 W US 2011067873W WO 2013101081 A1 WO2013101081 A1 WO 2013101081A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- boot
- processing system
- data processing
- digest
- cache
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/22—Microcontrol or microprogram arrangements
- G06F9/24—Loading of the microprogram
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
Definitions
- the present disclosure relates in general to trusted boot processes. More particularly, the present disclosure relates to optimizing trusted boot processes through the use of high integrity storage technology.
- malware e.g., computer viruses and rootkits
- low-level code such as the OS kernel, the OS boot loader, or even the firmware.
- This type of malicious code may be difficult for anti-virus software to detect and remove, because it may operate at the same security level as the anti- virus software.
- computing new hash values may take a great deal of time and may delay the loading of the OS. This delay may be reduced to some degree through hardware acceleration of the hash algorithm.
- stronger hash algorithms require more time to compute larger digests and continue to cause appreciable delay, even with hardware acceleration.
- the processor may also be connected to a non-volatile storage device 60, to a network adapter or port 28, to an input/output (I/O) port 26, and to I/O devices such as one or more displays 50 and one or more input devices 52 (e.g., a keyboard and a mouse).
- the storage device may be a hard disk drive (HDD), flash memory, or any other suitable storage technology.
- the network port may be used for communication between the data processing system and one or more remote data processing systems 44, via a LAN and/or a wide area network (WAN) 39, such as the Internet.
- WAN wide area network
- UEFI Specification which is available on the Internet at www.uefi.org/specs/.
- Chapter 27 of the UEFI Specification provides details for some aspects of a process that may be used to perform secure boot.
- those standards for operation may be further optimized or otherwise modified, according to the teachings provided herein.
- the present teachings may be used by data processing system with other kinds of BIOSs.
- a data processing system may use technology features such as those referred to collectively as Intel® TXT to provide for security. Additional details concerning Intel® TXT may be obtained from the Technology Brief referenced above and from the Internet at www.intel.com/technology/security.
- a boot integrity cache (BIC) 64 in the HIS partition contains hash values or digests for boot objects to be executed during boot.
- those digests may include, for instance, on or more "other driver” digests (referring to one or more digests for one or more objects "other" than the HIS driver), an OS loader digest, and one or more OS driver digests.
- the verifier can determine, based on the PCR log, whether the data processing system used HIS boot acceleration (e.g., whether the data processing system extended digests from cached values rather than directly computing those digests in real time).
- validation of the PCR log requires attested PCR values which are obtained from the TPM and which are signed by the TPM using an Attestation Identity Key (AIK).
- AIK Attestation Identity Key
- the PCR log directs the verifier on how to interpret and apply the PCR values such that they are meaningful. If the verifier has a policy against using HIS boot acceleration, then the verifier may decide to disallow access by the data processing system to resources protected by the verifier, or the verifier may apply some other compensating transaction to mitigate risk.
- the SCRTM may then use the CP of the TPM to hash a pre-EFI initialization (PEI) module from the system ROM, and may then extend the resulting digest into a PCR, as indicated at block 712.
- the SCRTM may then launch the PEI module.
- the PEI module may then hash the DXE loader and extend that digest into a PCR, as shown at block 716.
- the PEI module may then launch the DXE loader, as shown at block 718.
- the DXE loader may then hash the HIS driver and extend that digest into a PCR.
- the DXE loader may then launch the HIS driver, as shown at block 722.
- the HIS driver may then initialize the HIS subsystem by powering up the HIS device and configuring it so it is able to service read operations, while disallowing write or update operations.
- the DXE loader may launch various additional objects, and at least in some cases, before launching those objects, the DXE loader may read the digests for those objects from the boot integrity cache, instead of hashing those objects.
- the system ROM may contain an LCP which specifies some or all of the boot objects to be used during the boot process, and the DXE loader may process some or all of those objects according to the following process. The DXE loader may select the next boot object to be processed, as shown at block 724.
- the DXE driver determines whether the digest is in a "white list" of approved digests, as shown at block 920. As indicated at block 930, if the digest does not match any entries in the whitelist, the DXE loader determines whether the object has an embedded digital signature (e.g., a signature for a UEFI Portable Executable - Common Object File Format (PE-COFF) executable.) Such signatures may be created using the technology referred to by the trademark "Authenticode,” for example, or using any other suitable technology. If the object contains an embedded digital signature, that signature may be compared to entries in a whitelist of approved signatures, as indicated at block 940.
- an embedded digital signature e.g., a signature for a UEFI Portable Executable - Common Object File Format (PE-COFF) executable.
- P-COFF UEFI Portable Executable - Common Object File Format
- Figure 4 is a block diagram illustrating various components and operations associated with an alternative embodiment of an optimized secure boot process.
- the embodiment of Figure 4 is similar to the one of Figure 3, but in Figure 4 the TPM includes storage that serves as an HIS device, with a boot integrity cache. Consequently, read-extend operations may be used to extend the digests for boot objects into the PCR without reading those digests from system ROM or from option ROMs.
- Figure 6 illustrates various components and operations that may be used for the user authentication.
- Figure 6 shows interactions between the user 310 and the embedded access manager 25, including an authentication challenge from the embedded access manager and a corresponding response from the user.
- the embedded access manager thus requires the user to prove that he or she is authorized to update the HIS partition.
- This pre-boot authentication (PBA) may require the user to provide a userid and at least one credential.
- Credentials may include, without limitation, (1) something the user knows (e.g., a password), (2) something the user is (e.g., through use of a fingerprint or an iris scan) and/or (3) something the user owns (e.g., a USB dongle). These operations may be similar to the operations used for conventional hard drive password capabilities. Some embodiments may use the user identity infrastructure described in chapter 31 of the UEFI Specification. To perform user
- Similar operations may be performed to allow an authenticated administrator to update the HIS partition after the boot integrity cache has already been used. For instance, if the administrator has added an adapter card with an option ROM containing a driver that is trusted by the administrator, the administrator may request update access to the HIS device after installing that adapter card.
- the process described above may then be used to save the digest for the new driver and a copy of the new driver to the boot integrity cache, thereby updating the baseline system measurements.
- the same kind of process may be used for other updates, including, without limitation, system BIOS updates.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201180049417.1A CN103299311B (en) | 2011-12-29 | 2011-12-29 | Methods and apparatus for trusted boot optimization |
PCT/US2011/067873 WO2013101081A1 (en) | 2011-12-29 | 2011-12-29 | Methods and apparatus for trusted boot optimization |
US13/810,654 US8892858B2 (en) | 2011-12-29 | 2011-12-29 | Methods and apparatus for trusted boot optimization |
EP11878914.8A EP2798559B1 (en) | 2011-12-29 | 2011-12-29 | Methods and apparatus for trusted boot optimization |
KR1020137006741A KR101359841B1 (en) | 2011-12-29 | 2011-12-29 | Methods and apparatus for trusted boot optimization |
BR112014013583A BR112014013583A2 (en) | 2011-12-29 | 2011-12-29 | Method and apparatus for reliable boot optimization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2011/067873 WO2013101081A1 (en) | 2011-12-29 | 2011-12-29 | Methods and apparatus for trusted boot optimization |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013101081A1 true WO2013101081A1 (en) | 2013-07-04 |
Family
ID=48698317
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2011/067873 WO2013101081A1 (en) | 2011-12-29 | 2011-12-29 | Methods and apparatus for trusted boot optimization |
Country Status (6)
Country | Link |
---|---|
US (1) | US8892858B2 (en) |
EP (1) | EP2798559B1 (en) |
KR (1) | KR101359841B1 (en) |
CN (1) | CN103299311B (en) |
BR (1) | BR112014013583A2 (en) |
WO (1) | WO2013101081A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8892858B2 (en) | 2011-12-29 | 2014-11-18 | Intel Corporation | Methods and apparatus for trusted boot optimization |
WO2015060853A1 (en) | 2013-10-24 | 2015-04-30 | Intel Corporation | Techniques for pre-os image rewriting to provide cross-architecture support, security introspection, and performance optimization |
US9438627B2 (en) | 2014-06-11 | 2016-09-06 | International Business Machines Corporation | Shared security utility appliance for secure application and data processing |
US10262140B2 (en) | 2016-09-29 | 2019-04-16 | Intel Corporation | Methods and apparatus to facilitate blockchain-based boot tracking |
CN112740211A (en) * | 2018-09-28 | 2021-04-30 | 苹果公司 | Boot firmware sandboxing |
US20220309195A1 (en) * | 2021-03-23 | 2022-09-29 | Kabushiki Kaisha Toshiba | Control device, information processing device, and information processing system |
Families Citing this family (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5932837B2 (en) | 2011-01-19 | 2016-06-08 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method and system for updating and authenticating code, method and system for testing program integrity |
US8793504B2 (en) * | 2012-02-22 | 2014-07-29 | International Business Machines Corporation | Validating a system with multiple subsystems using trusted platform modules and virtual platform modules |
US9367688B2 (en) * | 2012-06-22 | 2016-06-14 | Intel Corporation | Providing geographic protection to a system |
WO2014077615A1 (en) * | 2012-11-19 | 2014-05-22 | Samsung Sds Co., Ltd. | Anti-malware system, method of processing packet in the same, and computing device |
US9336395B2 (en) * | 2013-01-25 | 2016-05-10 | Hewlett-Packard Development Company, L.P. | Boot driver verification |
US9424425B2 (en) | 2013-05-31 | 2016-08-23 | Microsoft Technology Licensing, Llc | Protecting anti-malware processes |
US9544293B2 (en) | 2013-09-20 | 2017-01-10 | Oracle International Corporation | Global unified session identifier across multiple data centers |
US9721104B2 (en) * | 2013-11-26 | 2017-08-01 | Intel Corporation | CPU-based measured boot |
CN104951316B (en) * | 2014-03-25 | 2018-09-21 | 华为技术有限公司 | A kind of credible startup method and apparatus of kernel |
US9672361B2 (en) * | 2014-04-30 | 2017-06-06 | Ncr Corporation | Self-service terminal (SST) secure boot |
US9195831B1 (en) | 2014-05-02 | 2015-11-24 | Google Inc. | Verified boot |
US20160042024A1 (en) * | 2014-08-08 | 2016-02-11 | Front Porch Digital, Inc. | Continuous data health check |
FR3024915B1 (en) * | 2014-08-18 | 2016-09-09 | Proton World Int Nv | DEVICE AND METHOD FOR PROVIDING SECURE PLATFORM MODULE SERVICES |
US9621551B2 (en) * | 2014-09-15 | 2017-04-11 | Dell Products L.P. | Systems and methods for providing secure pre-boot and root authentication to an information handling system |
GB2531586A (en) | 2014-10-23 | 2016-04-27 | Ibm | Methods and systems for starting computerized system modules |
CN104809398A (en) * | 2015-04-21 | 2015-07-29 | 深圳怡化电脑股份有限公司 | Tamper-proof method and tamper-proof device for bootstrap firmware of password keyboard |
US10693859B2 (en) | 2015-07-30 | 2020-06-23 | Oracle International Corporation | Restricting access for a single sign-on (SSO) session |
US10581826B2 (en) * | 2015-10-22 | 2020-03-03 | Oracle International Corporation | Run-time trust management system for access impersonation |
US10528739B2 (en) * | 2016-04-20 | 2020-01-07 | Sophos Limited | Boot security |
US10541816B2 (en) | 2016-06-01 | 2020-01-21 | International Business Machines Corporation | Controlling execution of software by combining secure boot and trusted boot features |
CN106250760A (en) * | 2016-07-26 | 2016-12-21 | 浪潮电子信息产业股份有限公司 | U-Boot trusted Boot method based on TPM 2.0 chip |
US10365961B2 (en) * | 2016-09-09 | 2019-07-30 | Dell Products L.P. | Information handling system pre-boot fault management |
US10623501B2 (en) | 2016-09-15 | 2020-04-14 | Oracle International Corporation | Techniques for configuring sessions across clients |
CN106844241A (en) * | 2017-02-27 | 2017-06-13 | 郑州云海信息技术有限公司 | A kind of safety card, security card slot and board |
US10474473B2 (en) * | 2017-04-11 | 2019-11-12 | Intel Corporation | Technology to facilitate rapid booting with high-speed and low-speed nonvolatile memory |
US10080693B1 (en) | 2017-04-26 | 2018-09-25 | Stryker Corporation | Harness system for patient transport apparatus |
US10397230B2 (en) * | 2017-06-15 | 2019-08-27 | International Business Machines Corporation | Service processor and system with secure booting and monitoring of service processor integrity |
US10528740B2 (en) | 2017-06-15 | 2020-01-07 | International Business Machines Corporation | Securely booting a service processor and monitoring service processor integrity |
US11290438B2 (en) | 2017-07-07 | 2022-03-29 | Oracle International Corporation | Managing session access across multiple data centers |
US10462664B2 (en) | 2017-08-02 | 2019-10-29 | Dell Products, Lp | System and method for control of baseboard management controller ports |
US11074348B2 (en) | 2017-08-24 | 2021-07-27 | International Business Machines Corporation | Securing and changing immutable data in secure bootup |
US11050730B2 (en) | 2017-09-27 | 2021-06-29 | Oracle International Corporation | Maintaining session stickiness across authentication and authorization channels for access management |
CN108701048B (en) | 2017-09-29 | 2020-09-11 | 华为技术有限公司 | Data loading method and device |
CN110069361B (en) * | 2018-01-24 | 2023-12-01 | 联想企业解决方案(新加坡)有限公司 | Method and apparatus for TPM failover |
US10726132B2 (en) * | 2018-03-08 | 2020-07-28 | Hewlett Packard Enterprise Development Lp | Enclave launch and authentication |
CN112437924A (en) * | 2018-05-11 | 2021-03-02 | 美国莱迪思半导体公司 | Secure boot system and method for programmable logic device |
US11409878B2 (en) | 2018-05-31 | 2022-08-09 | Hewlett-Packard Development Company, L.P. | Trusted sequence for computing devices via hashes |
JP7187362B2 (en) * | 2019-03-15 | 2022-12-12 | キオクシア株式会社 | Storage device and control method |
TWI724424B (en) * | 2019-05-17 | 2021-04-11 | 英商鼎通盛股份有限公司 | Method for accelerating verification process in a booting procedure and computer system thereof |
CN110348180B (en) * | 2019-06-20 | 2021-07-30 | 苏州浪潮智能科技有限公司 | Application program starting control method and device |
US11134078B2 (en) | 2019-07-10 | 2021-09-28 | Oracle International Corporation | User-specific session timeouts |
US11507387B2 (en) | 2020-05-26 | 2022-11-22 | Dell Products L.P. | Method to optimize system boot time of modules/driver's execution in UEFI pre-boot environment |
CN113101376A (en) * | 2021-04-12 | 2021-07-13 | 中国科学院长春应用化学研究所 | Composite gene vector for gene therapy and preparation method and application thereof |
US11803454B2 (en) * | 2021-04-30 | 2023-10-31 | Dell Products L.P. | Chained loading with static and dynamic root of trust measurements |
CN113254048B (en) * | 2021-06-21 | 2021-09-28 | 深之蓝(天津)水下智能科技有限公司 | Method, device and equipment for updating boot program and computer readable medium |
US11392705B1 (en) | 2021-07-29 | 2022-07-19 | Netskope, Inc. | Disk encryption key management for booting of a device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020166072A1 (en) * | 2001-05-02 | 2002-11-07 | International Business Machines Corporation | Data processing system and method for password protecting a boot device |
US20060090084A1 (en) * | 2004-10-22 | 2006-04-27 | Mark Buer | Secure processing environment |
WO2008016489A2 (en) | 2006-07-27 | 2008-02-07 | Hewlett-Packard Development Company, L.P. | Methods and systems for modifying an integrity measurement based on user athentication |
US20090259854A1 (en) * | 2008-04-10 | 2009-10-15 | Nvidia Corporation | Method and system for implementing a secure chain of trust |
US20110162077A1 (en) * | 2009-12-30 | 2011-06-30 | Kadam Akshay R | Protecting persistent secondary platform storage against attack from malicious or unauthorized programs |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6560706B1 (en) * | 1998-01-26 | 2003-05-06 | Intel Corporation | Interface for ensuring system boot image integrity and authenticity |
US6378072B1 (en) * | 1998-02-03 | 2002-04-23 | Compaq Computer Corporation | Cryptographic system |
US7103529B2 (en) | 2001-09-27 | 2006-09-05 | Intel Corporation | Method for providing system integrity and legacy environment emulation |
US7024555B2 (en) * | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7127579B2 (en) | 2002-03-26 | 2006-10-24 | Intel Corporation | Hardened extended firmware interface framework |
US7210034B2 (en) | 2003-01-30 | 2007-04-24 | Intel Corporation | Distributed control of integrity measurement using a trusted fixed token |
US20050021968A1 (en) | 2003-06-25 | 2005-01-27 | Zimmer Vincent J. | Method for performing a trusted firmware/bios update |
US7562230B2 (en) | 2003-10-14 | 2009-07-14 | Intel Corporation | Data security |
WO2005109184A1 (en) * | 2004-05-08 | 2005-11-17 | Intel Corporation | Firmware interface runtime environment protection field |
US7725703B2 (en) | 2005-01-07 | 2010-05-25 | Microsoft Corporation | Systems and methods for securely booting a computer with a trusted processing module |
US7523323B2 (en) | 2005-09-15 | 2009-04-21 | Intel Corporation | Method and apparatus for quick resumption |
US7765392B2 (en) * | 2006-06-29 | 2010-07-27 | Intel Corporation | Method and apparatus for establishing processor as core root of trust for measurement |
US8510859B2 (en) | 2006-09-26 | 2013-08-13 | Intel Corporation | Methods and arrangements to launch trusted, co-existing environments |
DE102006046456B4 (en) * | 2006-09-29 | 2009-11-05 | Infineon Technologies Ag | Circuit arrangement, method for starting up a circuit arrangement, method for operating a circuit arrangement and computer program products |
US8984265B2 (en) | 2007-03-30 | 2015-03-17 | Intel Corporation | Server active management technology (AMT) assisted secure boot |
US8321931B2 (en) * | 2008-03-31 | 2012-11-27 | Intel Corporation | Method and apparatus for sequential hypervisor invocation |
US8726364B2 (en) | 2008-06-30 | 2014-05-13 | Intel Corporation | Authentication and access protection of computer boot modules in run-time environments |
US8296553B2 (en) | 2008-11-19 | 2012-10-23 | Intel Corporation | Method and system to enable fast platform restart |
US8544092B2 (en) * | 2009-03-12 | 2013-09-24 | International Business Machines Corporation | Integrity verification using a peripheral device |
US8417962B2 (en) * | 2010-06-11 | 2013-04-09 | Microsoft Corporation | Device booting with an initial protection component |
US8516551B2 (en) | 2010-07-28 | 2013-08-20 | Intel Corporation | Providing a multi-phase lockstep integrity reporting mechanism |
US8539245B2 (en) | 2010-08-06 | 2013-09-17 | Intel Corporation | Apparatus and method for accessing a secure partition in non-volatile storage by a host system enabled after the system exits a first instance of a secure mode |
KR101359841B1 (en) | 2011-12-29 | 2014-02-07 | 인텔 코오퍼레이션 | Methods and apparatus for trusted boot optimization |
-
2011
- 2011-12-29 KR KR1020137006741A patent/KR101359841B1/en active IP Right Grant
- 2011-12-29 BR BR112014013583A patent/BR112014013583A2/en not_active IP Right Cessation
- 2011-12-29 CN CN201180049417.1A patent/CN103299311B/en not_active Expired - Fee Related
- 2011-12-29 US US13/810,654 patent/US8892858B2/en not_active Expired - Fee Related
- 2011-12-29 WO PCT/US2011/067873 patent/WO2013101081A1/en active Application Filing
- 2011-12-29 EP EP11878914.8A patent/EP2798559B1/en not_active Not-in-force
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020166072A1 (en) * | 2001-05-02 | 2002-11-07 | International Business Machines Corporation | Data processing system and method for password protecting a boot device |
US20060090084A1 (en) * | 2004-10-22 | 2006-04-27 | Mark Buer | Secure processing environment |
WO2008016489A2 (en) | 2006-07-27 | 2008-02-07 | Hewlett-Packard Development Company, L.P. | Methods and systems for modifying an integrity measurement based on user athentication |
US20090259854A1 (en) * | 2008-04-10 | 2009-10-15 | Nvidia Corporation | Method and system for implementing a secure chain of trust |
US20110162077A1 (en) * | 2009-12-30 | 2011-06-30 | Kadam Akshay R | Protecting persistent secondary platform storage against attack from malicious or unauthorized programs |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8892858B2 (en) | 2011-12-29 | 2014-11-18 | Intel Corporation | Methods and apparatus for trusted boot optimization |
WO2015060853A1 (en) | 2013-10-24 | 2015-04-30 | Intel Corporation | Techniques for pre-os image rewriting to provide cross-architecture support, security introspection, and performance optimization |
CN105556461A (en) * | 2013-10-24 | 2016-05-04 | 英特尔公司 | Techniques for pre-OS image rewriting to provide cross-architecture support, security introspection, and performance optimization |
EP3060980A4 (en) * | 2013-10-24 | 2017-06-28 | Intel Corporation | Techniques for pre-os image rewriting to provide cross-architecture support, security introspection, and performance optimization |
US9438627B2 (en) | 2014-06-11 | 2016-09-06 | International Business Machines Corporation | Shared security utility appliance for secure application and data processing |
US9537898B2 (en) | 2014-06-11 | 2017-01-03 | International Business Machines Corporation | Shared security utility appliance for secure application and data processing |
US10262140B2 (en) | 2016-09-29 | 2019-04-16 | Intel Corporation | Methods and apparatus to facilitate blockchain-based boot tracking |
CN112740211A (en) * | 2018-09-28 | 2021-04-30 | 苹果公司 | Boot firmware sandboxing |
US20220309195A1 (en) * | 2021-03-23 | 2022-09-29 | Kabushiki Kaisha Toshiba | Control device, information processing device, and information processing system |
US11562104B2 (en) * | 2021-03-23 | 2023-01-24 | Kabushiki Kaisha Toshiba | Control device, information processing device, and information processing system |
Also Published As
Publication number | Publication date |
---|---|
EP2798559B1 (en) | 2019-03-13 |
CN103299311A (en) | 2013-09-11 |
CN103299311B (en) | 2015-04-29 |
EP2798559A4 (en) | 2015-09-02 |
BR112014013583A8 (en) | 2017-06-13 |
BR112014013583A2 (en) | 2017-06-13 |
EP2798559A1 (en) | 2014-11-05 |
KR101359841B1 (en) | 2014-02-07 |
US20140025939A1 (en) | 2014-01-23 |
US8892858B2 (en) | 2014-11-18 |
KR20130094317A (en) | 2013-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8892858B2 (en) | Methods and apparatus for trusted boot optimization | |
US10152600B2 (en) | Methods and systems to measure a hypervisor after the hypervisor has already been measured and booted | |
JP6282305B2 (en) | System and method for safe execution of code in hypervisor mode | |
US8032942B2 (en) | Configuration of virtual trusted platform module | |
CN109669734B (en) | Method and apparatus for starting a device | |
US8544092B2 (en) | Integrity verification using a peripheral device | |
US7222062B2 (en) | Method and system to support a trusted set of operational environments using emulated trusted hardware | |
US9087188B2 (en) | Providing authenticated anti-virus agents a direct access to scan memory | |
US7853804B2 (en) | System and method for secure data disposal | |
EP2156357B1 (en) | Trusted operating environment for malware detection | |
US8068614B2 (en) | Methods and apparatus for batch bound authentication | |
EP2668566B1 (en) | Authenticate a hypervisor with encoded information | |
US20080235754A1 (en) | Methods and apparatus for enforcing launch policies in processing systems | |
US9805199B2 (en) | Securely booting a computer from a user trusted device | |
CN103927490A (en) | OS secure startup method and device | |
US20130305028A1 (en) | Method and apparatus for authorizing host to access portable storage device | |
JP2014518428A (en) | Protection and notification against BIOS flash attacks | |
US10592661B2 (en) | Package processing | |
US10853086B2 (en) | Information handling systems and related methods for establishing trust between boot firmware and applications based on user physical presence verification | |
US10037201B2 (en) | Secure live media boot system | |
EP3029564B1 (en) | System and method for providing access to original routines of boot drivers | |
JP4775744B2 (en) | Method and program for launching a reliable coexistence environment | |
Zimmer | Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface. | |
KR20110048014A (en) | Method and apparatus on computer platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 13810654 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 20137006741 Country of ref document: KR Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11878914 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011878914 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112014013583 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112014013583 Country of ref document: BR Kind code of ref document: A2 Effective date: 20140605 |