System and method for image authentication of a resource-sparing operating system
First Claim
1. A method of file system protection for a resource-sparing operating system (OS) image, comprising the steps of:
- loading the image into random access memory (RAM), the image including a catalog file embedded therein;
creating a first hash of the image;
extracting a second hash of the image from the catalog file; and
blocking the use of the image to boot the computing device when the first hash and the second hash do not match.
3 Assignments
0 Petitions
Accused Products
Abstract
A file system protection mechanism for an operating system image for a portable computing device is provided to assist in ensuring a good user experience. A signed catalog file is embedded in a resource-sparing operating system (OS), such as a Windows CE image, for security enhancement and load verification purposes. The invention performs various checks on the image and the signature of the image to ensure that image has not been maliciously modified and that it complies with a release standard. Such a mechanism is important to protect image loads from external threats made possible by, e.g. recent incorporation of broadband wireless and wireline connectivity for portable computing devices. The signing technique includes creating a signed catalog of the image and embedding that catalog into the image as it is loaded onto the portable computing device.
33 Citations
34 Claims
-
1. A method of file system protection for a resource-sparing operating system (OS) image, comprising the steps of:
-
loading the image into random access memory (RAM), the image including a catalog file embedded therein;
creating a first hash of the image;
extracting a second hash of the image from the catalog file; and
blocking the use of the image to boot the computing device when the first hash and the second hash do not match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of file system protection for a resource-sparing operating system (OS) image, the image including a catalog file embedded therein, comprising the steps of:
-
examining the catalog file and the image to determine if the image is a properly released image; and
blocking use of the image to boot the computing device when the step of examining determines that the image is not a properly released image. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A portable computing device, comprising:
-
flash memory, the flash memory including a protected area and an unprotected area;
a bootloader stored in the protected area of flash memory, the bootloader containing a crypto module;
an operating system image stored in the unprotected area of flash memory;
random access memory (RAM); and
wherein the crypto module of the bootloader is operative to examine an image update to determine if the image update should be programmed into the unprotected area of flash memory to boot the device based on information included in a signed catalog file embedded in the image update. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
Specification