Extending measured boot for secure link establishment

    公开(公告)号:US11709941B1

    公开(公告)日:2023-07-25

    申请号:US17305135

    申请日:2021-06-30

    CPC classification number: G06F21/575 H04L9/3073 H04L9/3265 G06F2221/034

    Abstract: A modified measured boot approach is utilized for establishing a secure communication link between two devices. Each device may execute a respective boot process until the device reaches the stage responsible for establishing the communication link with the other device. Each device may exchange its respective self-signed certificate and extend its certificate chain with the self-signed certificate received from the other device. Each device can then generate a new pair of keys based on its extended certificate chain that includes the identity of the other device, and exchange the public key of the new key pair with the other device. A secure link can be established using the public key of the other device as a based key for a key exchange protocol. A central management entity can attest the measurements of the boot stages for each device using the corresponding public key.

    Extending measured boot for secure link establishment

    公开(公告)号:US12235967B1

    公开(公告)日:2025-02-25

    申请号:US18323868

    申请日:2023-05-25

    Abstract: A modified measured boot approach is utilized for establishing a secure communication link between two devices. Each device may execute a respective boot process until the device reaches the stage responsible for establishing the communication link with the other device. Each device may exchange its respective self-signed certificate and extend its certificate chain with the self-signed certificate received from the other device. A secure link can be established using the public key of the other device as a based key for a key exchange protocol.

    Hardware-software interaction testing using formal verification

    公开(公告)号:US11544436B1

    公开(公告)日:2023-01-03

    申请号:US17353715

    申请日:2021-06-21

    Abstract: Hardware-software interaction testing is performed using formal verification for language-specified hardware designs. A description of valid access using an interface for a configuration space of a language specified hardware design and a description of a valid output of the language-specified hardware design is received. Formal verification is performed on the language-specified hardware design using the interface for the configuration space according to the description of valid access using the interface. A sequence of access to the configuration space using the interface that causes a failure to produce the valid output of the language-specified hardware design according to the description of valid output to identify as an error for the language-specified hardware design.

    Combination boot for an integrated circuit

    公开(公告)号:US12223052B1

    公开(公告)日:2025-02-11

    申请号:US17695630

    申请日:2022-03-15

    Abstract: A boot process for a computing device, such as integrated circuit, includes security features that are inaccessible during certain operation modes. An image including permission to access those security features is received during the boot process and may be verified using one or more keys. In operation, access to the security features is permitted during the operation modes after the image is verified. Such an approach enables a boot process to permit access to certain features after receipt and verification of different images.

    Secure monitors for memory page protection

    公开(公告)号:US12216921B1

    公开(公告)日:2025-02-04

    申请号:US17710489

    申请日:2022-03-31

    Abstract: Technologies are disclosed for using hardware-embedded monitors to monitor pages of local memory and detect attribute violations or other unauthorized operations relating to the memory. The attribute violations may include mismatches of attributes (e.g., designating a page as writeable versus executable or vice versa) in entries in a translation buffer that point to a same physical address or other mismatches between designations of attributes for a page in physical and virtual space. Responsive to detecting a violation, an alert or other mitigation protocol, which may include an audit of activities surrounding the violation, may be performed.

Patent Agency Ranking