BOOT DRIVER VERIFICATION
First Claim
Patent Images
1. A system, comprising:
- a secure hash calculation engine to intercept and calculate a secure hash for a pre-boot driver before the pre-boot driver is executed;
wherein the pre-boot driver is executed based on the computed secure hash being successfully verified; and
wherein the pre-boot driver is not executed based on the computed secure hash not being successfully verified.
1 Assignment
0 Petitions
Accused Products
Abstract
An example system in accordance with the present disclosure includes a secure hash calculation engine to intercept and calculate a secure hash for a pre-boot driver before the pre-boot driver is executed, wherein the pre-boot driver is executed based on the computed secure hash being successfully verified, and wherein the pre-boot driver is not executed based on the computed secure hash not being successfully verified.
-
Citations
20 Claims
-
1. A system, comprising:
-
a secure hash calculation engine to intercept and calculate a secure hash for a pre-boot driver before the pre-boot driver is executed; wherein the pre-boot driver is executed based on the computed secure hash being successfully verified; and wherein the pre-boot driver is not executed based on the computed secure hash not being successfully verified. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
intercepting a pre-boot driver before the pre-boot driver is executed; computing a secure hash for the pre-boot driver; executing the pre-boot driver based on the computed secure hash being successfully verified; and preventing the pre-boot driver from executing based on the computed secure hash not being successfully verified. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage device (CRSD) storing code, that when executed, causes a processor to:
-
intercept a pre-boot driver before the driver is executed; compute a hash value for the pre-boot driver; execute the pre-boot driver based on a successful verification of the pre-boot driver; and consult local security protocol based on an unsuccessful verification of the pre-boot driver; wherein the security protocol contains rules for handling pre-boot drivers when the verification is unsuccessful. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification