Method for authenticating firmware volume and system therefor
First Claim
1. A method comprising:
- accessing a first firmware volume of a Unified Extensible Firmware Interface (UEFI) compliant information handling system;
retrieving, using a computer, authentication information from the first firmware volume using a UEFI Secure Architecture Protocol (SAP);
determining, based on the authentication information, if the first firmware volume is a first type of firmware volume;
if the first firmware volume is the first type of firmware volume, then authenticating the first firmware volume using the first authentication information and an authentication procedure other than Secure Boot authentication; and
if the first firmware volume is a second type of firmware volume, the second type different than the first type, then authenticating the first firmware volume using the first authentication information and the Secure Boot authentication.
14 Assignments
0 Petitions
Accused Products
Abstract
A first firmware volume of a Unified Extensible Firmware Interface (UEFI) compliant information handling system is accessed. Authentication information is retrieved from the first firmware volume using a UEFI Secure Architecture Protocol. Based on the authentication information, it is determined if the first firmware volume is a first type of firmware volume. If the first firmware volume is the first type of firmware volume, the first firmware volume is authenticated using the first authentication information and an authentication procedure other than Secure Boot authentication. If the first firmware volume is a second type of firmware volume, the second type different than the first type, the first firmware volume is authenticated using the first authentication information and the Secure Boot authentication.
-
Citations
20 Claims
-
1. A method comprising:
-
accessing a first firmware volume of a Unified Extensible Firmware Interface (UEFI) compliant information handling system; retrieving, using a computer, authentication information from the first firmware volume using a UEFI Secure Architecture Protocol (SAP); determining, based on the authentication information, if the first firmware volume is a first type of firmware volume; if the first firmware volume is the first type of firmware volume, then authenticating the first firmware volume using the first authentication information and an authentication procedure other than Secure Boot authentication; and if the first firmware volume is a second type of firmware volume, the second type different than the first type, then authenticating the first firmware volume using the first authentication information and the Secure Boot authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
determining, using a Unified Extensible Firmware Interface (UEFI) Secure Architecture Protocol (SAP), that a first firmware volume is provided by an original equipment manufacturer (OEM) of an information handling system; authenticating the first firmware volume using a computer and a first authentication procedure, the first authentication procedure other than Secure Boot authentication; determining, using the UEFI SAP, that a second firmware volume is provided by an original design manufacture (ODM), the ODM associated with a component of the information handling system; and authenticating the second firmware volume using Secure Boot authentication. - View Dependent Claims (9, 10, 11, 12)
-
-
13. An information handling system comprising:
-
a Unified Extensible Firmware Interface (UEFI) compliant basic input-output system (BIOS); a data storage device for storing a first firmware volume and a second firmware volume; and a processor to; access the first firmware volume; retrieve authentication information from the first firmware volume using a UEFI Secure Architecture Protocol (SAP); and classify the first firmware volume as one of two distinct types of firmware volumes based on the authentication information, the two distinct types including a first type and a second type. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification