Method to Protect BIOS NVRAM from Malicious Code Injection by Encrypting NVRAM Variables and System Therefor
First Claim
Patent Images
1. A method comprising:
- receiving data to be stored at a firmware memory, the data to be stored at a partition of the firmware memory different than a partition for storing firmware instructions;
generating a random symmetric encryption key;
encrypting the data using the generated key to provide encrypted data; and
storing the encrypted data and the encryption key at the firmware memory.
14 Assignments
0 Petitions
Accused Products
Abstract
Data to be stored at a firmware memory is received. A random symmetric encryption key is generated. The data is encrypted using the generated key to provide encrypted data. The encrypted data and the encryption key are both stored at the firmware memory.
31 Citations
20 Claims
-
1. A method comprising:
-
receiving data to be stored at a firmware memory, the data to be stored at a partition of the firmware memory different than a partition for storing firmware instructions; generating a random symmetric encryption key; encrypting the data using the generated key to provide encrypted data; and storing the encrypted data and the encryption key at the firmware memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An information handling system comprising:
-
a processor; a system memory device; and a firmware memory device for storing firmware, the firmware including instructions to; receive data to be stored at a firmware memory; generate a random symmetric encryption key; encrypt the data using the generated key to provide encrypted data; and store the encrypted data and the encryption key at the firmware memory. - View Dependent Claims (15, 16, 17)
-
-
18. A non-transitory data storage medium storing instructions executable by a processor to cause the processor to:
-
receive, at an interface for storing and retrieving data at a firmware memory, data to be stored at the firmware memory; generate, by the interface, a random symmetric encryption key; encrypt the data using the generated key to provide encrypted data; and store the encrypted data and the encryption key at the firmware memory. - View Dependent Claims (19, 20)
-
Specification