Apparatus and method for securing BIOS in a trusted computing system
First Claim
1. An apparatus for protecting a basic input/output system (BIOS) in a computing system, the apparatus comprising:
- a BIOS read only memory (ROM), comprising;
BIOS contents, wherein said BIOS contents are stored as plaintext; and
an encrypted message digest, wherein said encrypted message digest comprises an encrypted version of a first message digest that corresponds to said BIOS contents, and wherein said encrypted version is generated via a symmetric key algorithm and a key;
a tamper detector, disposed within a microprocessor and operatively coupled to said BIOS ROM, configured to access said BIOS contents and said encrypted message digest upon reset of said microprocessor, and configured to direct a crypto/hash unit within said microprocessor to generate a second message digest corresponding to said BIOS contents and a decrypted message digest corresponding to said encrypted message digest using said symmetric key algorithm and said key, and configured to compare said second message digest with said decrypted message digest, and configured to preclude operation of said microprocessor when said second message digest and said decrypted message digest are not equal, and configured to allow operation of said microprocessor when said second message digest and said decrypted message digest are equal; and
a random number generator, configured to generate a random number for entry into a tamper at completion of a periodic BIOS hack check to set a following interval for a next BIOS hack check.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus including a BIOS read only memory (ROM) and a tamper detector. The BIOS ROM includes BIOS contents stored as plaintext, and an encrypted message digest comprising an encrypted version of a first message digest that corresponds to the BIOS contents. The tamper detector is coupled to the BIOS ROM, and accesses the BIOS contents and the encrypted message digest upon reset of a microprocessor, and directs the microprocessor to generate a second message digest corresponding to the BIOS contents and a decrypted message digest corresponding to the encrypted message digest using the same algorithms and key that were employed to generate the first message digest and the encrypted message digest, and compares the second message digest with the decrypted message digest, and precludes the operation of the microprocessor if the second message digest and the decrypted message digest are not equal.
66 Citations
21 Claims
-
1. An apparatus for protecting a basic input/output system (BIOS) in a computing system, the apparatus comprising:
-
a BIOS read only memory (ROM), comprising; BIOS contents, wherein said BIOS contents are stored as plaintext; and an encrypted message digest, wherein said encrypted message digest comprises an encrypted version of a first message digest that corresponds to said BIOS contents, and wherein said encrypted version is generated via a symmetric key algorithm and a key; a tamper detector, disposed within a microprocessor and operatively coupled to said BIOS ROM, configured to access said BIOS contents and said encrypted message digest upon reset of said microprocessor, and configured to direct a crypto/hash unit within said microprocessor to generate a second message digest corresponding to said BIOS contents and a decrypted message digest corresponding to said encrypted message digest using said symmetric key algorithm and said key, and configured to compare said second message digest with said decrypted message digest, and configured to preclude operation of said microprocessor when said second message digest and said decrypted message digest are not equal, and configured to allow operation of said microprocessor when said second message digest and said decrypted message digest are equal; and a random number generator, configured to generate a random number for entry into a tamper at completion of a periodic BIOS hack check to set a following interval for a next BIOS hack check. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for protecting a basic input/output system (BIOS) in a computing system, the apparatus comprising:
-
a BIOS read only memory (ROM), comprising; BIOS contents, wherein said BIOS contents are stored as plaintext; and an encrypted message digest, wherein said encrypted message digest comprises an encrypted version of a first message digest that corresponds to said BIOS contents, and wherein said encrypted version is generated via a symmetric key algorithm and a key; and a microprocessor, coupled to said BIOS ROM, said microprocessor comprising; a tamper detector, configured to access said BIOS contents and said encrypted message digest upon reset of said microprocessor, and configured to direct a crypto/hash unit within said microprocessor to generate a second message digest corresponding to said BIOS contents and a decrypted message digest corresponding to said encrypted message digest using said symmetric key algorithm and said key, and configured to compare said second message digest with said decrypted message digest, and configured to preclude operation of said microprocessor when said second message digest and said decrypted message digest are not equal, and configured to allow operation of said microprocessor when said second message digest and said decrypted message digest are equal; and a random number generator, configured to generate a random number for entry into a tamper at completion of a periodic BIOS hack check to set a following interval for a next BIOS hack check. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for protecting a basic input/output system (BIOS) in a computing system, the method comprising:
-
storing BIOS contents as plaintext in a BIOS ROM along with an encrypted message digest that comprises an encrypted version of first message digest that corresponds to the BIOS contents, wherein the encrypted version is generated via a symmetric key algorithm and a key; upon reset of a microprocessor, accessing the BIOS contents and the encrypted message digest, and generating a second message digest corresponding to the BIOS contents and a decrypted message digest corresponding to the first encrypted message digest using the symmetric key algorithm and the key; comparing the second message digest with the decrypted message digest; precluding operation of the microprocessor when the second message digest and the decrypted message digest are not equal; allowing operation of the microprocessor when the second message digest and the decrypted message digest are equal; and generating a random number for entry into a tamper timer at completion of a periodic BIOS hack check to set a following interval for a next BIOS hack check. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification