Secure boot of an integrated circuit

    公开(公告)号:US11520891B1

    公开(公告)日:2022-12-06

    申请号:US16710487

    申请日:2019-12-11

    Abstract: A computer chip, such as an System on chip (SOC), can receive firmware updates having two separate signatures; a first of the signatures is used to authenticate the firmware using a processor within the computer chip, and a second of the signatures is used by a controller, separate from the processor. A first key, used by the processor to authenticate the firmware, can be a boot key that is hardwired in the computer chip. A second key, used by the controller, can be a key that is provided to the controller at any time and is updatable. The controller can suspend the processor so that the controller can perform a first authentication of the firmware using the second signature and the second key. If the authentication is successful, the controller can release the processor, which then uses the first key and the first signature to perform a second authentication.

    Extending measured boot for secure link establishment

    公开(公告)号:US12235967B1

    公开(公告)日:2025-02-25

    申请号:US18323868

    申请日:2023-05-25

    Abstract: A modified measured boot approach is utilized for establishing a secure communication link between two devices. Each device may execute a respective boot process until the device reaches the stage responsible for establishing the communication link with the other device. Each device may exchange its respective self-signed certificate and extend its certificate chain with the self-signed certificate received from the other device. A secure link can be established using the public key of the other device as a based key for a key exchange protocol.

    Extending measured boot for secure link establishment

    公开(公告)号:US11709941B1

    公开(公告)日:2023-07-25

    申请号:US17305135

    申请日:2021-06-30

    CPC classification number: G06F21/575 H04L9/3073 H04L9/3265 G06F2221/034

    Abstract: A modified measured boot approach is utilized for establishing a secure communication link between two devices. Each device may execute a respective boot process until the device reaches the stage responsible for establishing the communication link with the other device. Each device may exchange its respective self-signed certificate and extend its certificate chain with the self-signed certificate received from the other device. Each device can then generate a new pair of keys based on its extended certificate chain that includes the identity of the other device, and exchange the public key of the new key pair with the other device. A secure link can be established using the public key of the other device as a based key for a key exchange protocol. A central management entity can attest the measurements of the boot stages for each device using the corresponding public key.

    Combination boot for an integrated circuit

    公开(公告)号:US12223052B1

    公开(公告)日:2025-02-11

    申请号:US17695630

    申请日:2022-03-15

    Abstract: A boot process for a computing device, such as integrated circuit, includes security features that are inaccessible during certain operation modes. An image including permission to access those security features is received during the boot process and may be verified using one or more keys. In operation, access to the security features is permitted during the operation modes after the image is verified. Such an approach enables a boot process to permit access to certain features after receipt and verification of different images.

    Secure monitors for memory page protection

    公开(公告)号:US12216921B1

    公开(公告)日:2025-02-04

    申请号:US17710489

    申请日:2022-03-31

    Abstract: Technologies are disclosed for using hardware-embedded monitors to monitor pages of local memory and detect attribute violations or other unauthorized operations relating to the memory. The attribute violations may include mismatches of attributes (e.g., designating a page as writeable versus executable or vice versa) in entries in a translation buffer that point to a same physical address or other mismatches between designations of attributes for a page in physical and virtual space. Responsive to detecting a violation, an alert or other mitigation protocol, which may include an audit of activities surrounding the violation, may be performed.

Patent Agency Ranking