METHOD AND APPARATUS FOR MANAGING SECURITY STATE TRANSITIONS
First Claim
1. A method comprising the steps of:
- operating in a secure state;
determining that a transition to an unsecure state has taken place;
erasing a token when it is determined that the transition to the unsecured state has taken place, wherein the token is utilized to indicate a secure state.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for managing security state transitions within a device is provided herein. During operation a security token will indicate whether or not a device is operating in a secured or unsecured state. The security token controls whether or not image validation will take place and if access to security critical resources is allowed. When a switch to a non secure state is made, the security token will be eliminated and blocked from recreation in the non-secure state, thus preventing non-secure code from spoofing a secure state indication. In the non-secure state, image validation is bypassed and the non-secure code is allowed to execute. Once a switch back to a secure state takes place, the secure token is recreated and all images on the device are analyzed to determine if they are approved.
42 Citations
20 Claims
-
1. A method comprising the steps of:
-
operating in a secure state; determining that a transition to an unsecure state has taken place; erasing a token when it is determined that the transition to the unsecured state has taken place, wherein the token is utilized to indicate a secure state. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising the steps of:
-
booting a device; determining if a security token is present; allowing only approved images to be stored and executed on the device, and allowing security dependent features to be fully operational when it has been determined that the security token is present; and allowing non-approved images to be stored and executed on the device, and not allowing security dependent features to be fully operational when it has been determined that the security token is not present. - View Dependent Claims (8, 9, 10)
-
-
11. An apparatus comprising:
-
memory storing a token; a processor determining that a transition to an unsecure state has taken place, and erasing the token when it is determined that the transition to the unsecured state has taken place. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. An apparatus comprising:
-
a memory storing a token; a processor executing the steps of; determining if a security token is present; allowing only approved images to be stored and executed on the device, and allowing security dependent features to be fully operational when it has been determined that the security token is present; and allowing non-approved images to be stored and executed on the device, and not allowing the security dependent features to be fully operational when it has been determined that the security token is not present. - View Dependent Claims (18, 19, 20)
-
Specification