Control function with multiple security states for facilitating secure operation of an integrated system
First Claim
1. A method for facilitating secure operation of an integrated device chip, the method comprising:
- initially programming a data access controller by a master of the integrated device chip for secure operation, wherein the data access controller and the master are both disposed within the integrated device chip;
after initial programming, passing a request for data through the data access controller;
selectively qualifying the request for data passing through the data access controller in accordance with a security state of the data access controller determined pursuant to at least one security parameter set during the initial programming of the data access controller by the master of the integrated device chip, wherein the security state of the data access controller comprises one state of multiple possible security states; and
wherein the request for data comprises a request for boot code, and the security state comprises a secured state, and wherein the selectively qualifying includes;
replacing a standard boot code address associated with the request for boot code with a substitute boot code address held at the data access controller when in the secured state, wherein the substitute boot code address can be employed to access an encrypted version of boot code; and
decrypting the encrypted version of boot code prior to return thereof to a functional master initiating the request for boot code.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique is provided for facilitating secure operation of an integrated system. The technique includes passing a request for data through a data access controller incorporated within the integrated system, and selectively qualifying the request in accordance with a security state of the controller. The security state of the controller is one state of multiple possible security states, including a null state and a secured state. In the secured state, the controller replaces a standard boot code address associated with a request for boot code with a substitute boot code address. The substitute boot code address addresses an encrypted version of boot code, which is then decrypted by the controller employing a master key set held at the controller. When transitioning to the null state, the master key set is erased.
89 Citations
16 Claims
-
1. A method for facilitating secure operation of an integrated device chip, the method comprising:
-
initially programming a data access controller by a master of the integrated device chip for secure operation, wherein the data access controller and the master are both disposed within the integrated device chip; after initial programming, passing a request for data through the data access controller; selectively qualifying the request for data passing through the data access controller in accordance with a security state of the data access controller determined pursuant to at least one security parameter set during the initial programming of the data access controller by the master of the integrated device chip, wherein the security state of the data access controller comprises one state of multiple possible security states; and wherein the request for data comprises a request for boot code, and the security state comprises a secured state, and wherein the selectively qualifying includes; replacing a standard boot code address associated with the request for boot code with a substitute boot code address held at the data access controller when in the secured state, wherein the substitute boot code address can be employed to access an encrypted version of boot code; and decrypting the encrypted version of boot code prior to return thereof to a functional master initiating the request for boot code. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of fabricating an integrated device chip to facilitate secure operation thereof, the method comprising:
-
providing, by a device manufacturer, an integrated device chip with a data access controller and master for selectively qualifying a request for data from a functional master within the integrated device chip, wherein the data access controller comprises multiple possible security states, and wherein the providing includes initially providing the data access controller in a null state of the multiple possible security states; assembling, by a system manufacturer, the integrated device chip into a computing environment, wherein the assembling includes writing a master key set and a substitute boot address to persistent storage within the data access controller of the integrated device chip for use in the selectively qualifying, initially programming at least one security parameter for the data access controller by the master of the integrated device for secure operation, and initiating transition of the data access controller to a secured state determined pursuant to the at least one security parameter set during initial programming of the data access controller by the master of the integrated device chip, the secured state comprising another state of the multiple possible security states; and wherein when in the secured state, the data access controller selectively qualifies requests for data passing therethrough, and wherein when a request for data comprises a request for boot code, the selectively qualifying includes replacing a standard boot code address associated with the request for boot code with a substitute boot code address held by the data access controller, wherein the substitute boot code address can be employed to access an encrypted version of boot code, and decrypting the encrypted version of boot code prior of return thereof to a functional master of the integrated device initiating the request for boot code.
-
-
7. A system for facilitating secure operation of an integrated device chip, the system comprising:
-
means for initially programming a data access controller by a master of the integrated device chip for secure operation, wherein the data access controller and the master are both disposed within the integrated device chip; means for passing a request for data through the data access controller, the data access controller receiving the request for data from a functional master of the integrated device chip; wherein the data access controller comprises means for selectively qualifying the request for data received by the data access controller in accordance with a security state of the data access controller determined pursuant to at least one security parameter set during the initial programming of the data access controller by the master of the integrated device chip, wherein the security state of the data access controller comprises one state of multiple possible security states; and wherein the request for data comprises a request for boot code, and the security state comprises a secured state, and wherein the means for selectively qualifying includes; means for replacing a standard boot code address associated with the request for boot code with a substitute boot code address held at the data access controller when in the secured state, wherein the substitute boot code address can be employed to access an encrypted version of boot code; and means for decrypting the encrypted version of boot code prior to return thereof to a functional master initiating the request for boot code. - View Dependent Claims (8, 9, 10, 11)
-
-
12. At least one program storage device readable by a machine, tangibly embodying at least one program of instructions executable by the machine to perform a method for facilitating secure operation of an integrated device chip, the method comprising:
-
initially programming a data access controller by a master of the integrated device chip for secure operation, wherein the data access controller and the master are both disposed within the integrated device chip; after initial programming, passing a request for data through the data access controller; selectively qualifying the request for data passing through the data access controller in accordance with a security state of the data access controller determined pursuant to at least one security parameter set during the initial programming of the data access controller by the master of the integrated device chip, wherein the security state of the data access controller comprises one state of multiple possible security states; wherein the request for data comprises a request for boot code, and the security state comprises a secured state, and wherein the selectively qualifying includes; replacing a standard boot code address associated with the request for boot code with a substitute boot code address held at the data access controller when in the secured state, wherein the substitute boot code address can be employed to access an encrypted version of boot code; and decrypting the encrypted version of boot code prior to return thereof to a functional master initiating the request for boot code. - View Dependent Claims (13, 14, 15, 16)
-
Specification