-
公开(公告)号:US20230079183A1
公开(公告)日:2023-03-16
申请号:US17472432
申请日:2021-09-10
Applicant: QUALCOMM INCORPORATED
Inventor: Aneesh BANSAL , Priyanka DOSI
Abstract: Memory regions may be protected based on occurrence of an event in a computing device. Subsystems of the computing device may store information in a memory controller identifying memory regions to be erased upon occurrence of an event, such as a system or subsystem crash. The memory controller may control erasing the memory regions in response to an indication associated with the event. A memory dump may be performed after the memory regions have been erased.
-
公开(公告)号:US20250061181A1
公开(公告)日:2025-02-20
申请号:US18452209
申请日:2023-08-18
Applicant: QUALCOMM Incorporated
Inventor: Rengarajan RAGAVAN , Changjian GAO , Samar ASBE , Shivaprasad HONGAL , Denis POCHUEV , Richard Wesley BASS , Priyanka DOSI
Abstract: Systems and techniques are provided for establishing a connection. For instance, a process may include receiving, by a first root of trust (C-ROT) of a first chiplet of a plurality of chiplets from a second C-RoT of a second chiplet, a second certificate along with security state information and debug information for the second chiplet; authenticating a security state and a debug state of the second chiplet based on the security state information and the debug information; authenticating the second certificate; and establishing a security boundary with the second chiplet.
-
公开(公告)号:US20240193246A1
公开(公告)日:2024-06-13
申请号:US18064901
申请日:2022-12-12
Applicant: QUALCOMM Incorporated
Inventor: Aneesh BANSAL , Priyanka DOSI , Ghanashyam PRABHU
CPC classification number: G06F21/36 , G06F21/575 , G06F2221/033
Abstract: Systems and techniques are provided for image authentication for secure boot. For example, a process for image authentication for secure boot can include: obtaining an expected tag image comprising an expected tag corresponding to an image to be loaded into memory; loading the expected tag into a first memory region corresponding to a hardware memory authenticator; loading, by the memory controller, the image into a second memory region; providing an authentication indication to the hardware memory authenticator, wherein the authentication indication triggers the hardware memory authenticator to authenticate the image; reading a portion of the image from the second memory region; generating, at the hardware memory authenticator, an authentication tag corresponding to the portion of the image; and performing a comparison of the authentication tag and the expected tag to obtain an authentication result, wherein, the authentication result is a successful match, and the portion of the image is authenticated.
-
-