×

Trusting an unverified code image in a computing device

  • US 8,826,405 B2
  • Filed: 09/15/2012
  • Issued: 09/02/2014
  • Est. Priority Date: 01/07/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method, comprising:

  • executing a trusted code image in a device, wherein the trusted code image comprises a trusted boot image that relates to long term power management associated with the device or a trusted boot image that causes hardware initialization for an operating environment associated with the device, the trusted code image is configured to disable access to a unique identifier stored within a memory of the device, and the unique identifier uniquely identifies the device and is used to verify an unverified application code image,wherein said executing includes disabling the unique identifier according to a predetermined condition that is preconfigured by a vendor associated with the device, wherein the disabling involves preventing the unverified application code image from accessing device hardware of the device, and wherein the device hardware is accessed by having the unique identifier enabled and by reading or setting one or more values of one or more device hardware parameters of the device;

    loading, subsequent to the execution of the trusted code image, the unverified application code image into the device for execution without verifying the unverified application code image according to the unique identifier;

    in response to a request to access the device hardware based on the execution of the unverified application code image, executing a secure code in the memory to determine whether the unique identifier is enabled to grant the request to access the device hardware; and

    in response to a determination that the unique identifier is disabled, continuing the execution of the unverified application code image without access to the device hardware.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×