SIMPLE SCALABLE AND CONFIGURABLE SECURE BOOT FOR TRUSTED MOBILE PHONES
First Claim
1. A method of booting up a system using a secure boot framework, the system comprising a computational engine and a secure environment operating within the computational engine and isolated from one or more programs, functions and resources operating outside the secure environment, the method comprising:
- executing a secure enforcement function located outside the secure environment, said secure enforcement function configured to ensure that only authorized program modules are executed on the system; and
executing at least one program module using the secure enforcement function, if the program module is authorized prior to execution.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus, system and computer program product are provided for booting up a system using a secure boot framework. In particular, a secure boot mechanism (i.e., a mechanism that enforces that only authenticated programs and/or events are executed on a particular platform) is provided that has an unlimited number of authorized boot configurations, while requiring only a minimal amount of secure/confidential storage. The secure boot mechanism further provides for the separation of run-time and management functionality, which allows other authorization mechanisms to be plugged-in later on. In addition, the authorized secure boot configurations (i.e., the definition of the secure boot state) can be kept in insecure storage, such as a system disk (e.g., flash memory). Finally, the disclosed secure boot mechanism is further beneficial because it builds upon existing TCG techniques, causing it to require minimal implementation where TCG techniques are implemented.
-
Citations
44 Claims
-
1. A method of booting up a system using a secure boot framework, the system comprising a computational engine and a secure environment operating within the computational engine and isolated from one or more programs, functions and resources operating outside the secure environment, the method comprising:
-
executing a secure enforcement function located outside the secure environment, said secure enforcement function configured to ensure that only authorized program modules are executed on the system; and
executing at least one program module using the secure enforcement function, if the program module is authorized prior to execution. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus configured to boot up using a secure boot framework, the apparatus comprising a computational engine and a secure environment operating within the computational engine and isolated from one or more programs, functions and resources operating outside the secure environment;
- the apparatus comprising;
a processor; and
a memory in communication with the processor, said memory storing an application executable by the processor, wherein the application is configured, upon execution to;
execute a secure enforcement function located outside the secure environment, said secure enforcement function configured to ensure that only authorized program modules are executed on the apparatus; and
execute at least one program module using the secure enforcement function, if the program module is authorized prior to execution. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
- the apparatus comprising;
-
25. A system configured to boot up using a secure boot framework, said system comprising:
a secure enforcement function configured to determine whether a program module is authorized for execution on the system and to execute the program module if the program module is authorized, said secure enforcement function operating outside of a secure environment of the system. - View Dependent Claims (31)
-
26. The system of claim 26, further comprising:
an event credential store operating outside the secure environment and comprising a plurality of event credentials, wherein in order to determine whether a program module is authorized, the secure enforcement function is further configured to create an event associated with execution of the program module, said event comprising a code corresponding with the execution, and to locate an event credential associated with the event in the plurality of event credentials of the event credential store. - View Dependent Claims (27, 28, 29, 30)
-
32. A computer program product for booting up a system using a secure boot framework, the system comprising a computational engine and a secure environment operating within the computational engine and isolated from one or more programs, functions and resources operating outside the secure environment, wherein the computer program product comprises at least one computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising:
-
a first executable portion for executing a secure enforcement function located outside the secure environment, said secure enforcement function configured to ensure that only authorized program modules are executed on the system; and
a second executable portion for executing at least one program module using the secure enforcement function, if the program module is authorized prior to execution. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. An apparatus configured to boot up using a secure boot framework, the apparatus comprising a computational engine and a secure environment operating within the computational engine and isolated from one or more programs, functions and resources operating outside the secure environment, the apparatus comprising:
-
means for executing a secure enforcement function located outside the secure environment, said secure enforcement function configured to ensure that only authorized program modules are executed on the system; and
means for executing at least one program module using the secure enforcement function, if the program module is authorized prior to execution.
-
Specification