SECURELY RECOVERING A COMPUTING DEVICE
First Claim
1. A computer implemented method, comprising:
- loading a code image digitally signed by a signature into a device, the code image being received from a host over a communication link;
determining if the code image is certified by verifying the signature using a fingerprint embedded within ROM (read only memory) of the device; and
executing the code image if the code image is certified to establish an operating environment of the device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code.
13 Citations
27 Claims
-
1. A computer implemented method, comprising:
-
loading a code image digitally signed by a signature into a device, the code image being received from a host over a communication link; determining if the code image is certified by verifying the signature using a fingerprint embedded within ROM (read only memory) of the device; and executing the code image if the code image is certified to establish an operating environment of the device. - View Dependent Claims (2, 3, 4, 5, 6, 21)
-
-
7. A machine-readable medium having instructions stored therein, which when executed by a machine, cause the machine to perform a method, the method comprising:
-
loading a code image digitally signed by a signature into a device, the code image being received from a host over a communication link; determining if the code image is certified by verifying the signature using a fingerprint embedded within ROM (read only memory) of the device; and executing the code image if the code image is certified to establish an operating environment of the device. - View Dependent Claims (8, 9, 10, 11, 12, 22)
-
-
13. A digital processing system, comprising:
-
a ROM (read only memory) to store a fingerprint embedded therein; a mass storage to store a code image digitally signed by a signature and received from a host over a communication link; a main memory; and a processor coupled to the ROM, the mass storage, and the main memory to verify the code image using the fingerprint and upon successfully verifying the code image, to execute the code image in the main memory to establish an operating environment of the digital processing system. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
14-20. -20. (canceled)
Specification