Locking mechanism override and disable for personal computer ROM access protection
First Claim
1. A system, comprising:
- a processor configured to operate in an operating mode, wherein the operating mode is one of a plurality of operating modes including a secure operating mode;
one or more secured assets coupled to the processor; and
security hardware configured to control access to the secured assets dependant upon the operating mode of the processor, wherein the security hardware is configured to allow access to the secure assets in the secure operating mode, and wherein the security hardware includes a lock override register configured to deny access to the secure assets when a lock override bit is set.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for overriding access locks on secure assets in a computer system. The system includes a processor and a device coupled to the processor. The device includes one or more sub-devices, one or more access locks, and an access lock override register that stores one or more access lock override bits, including a lock override bit. The one or more access locks are configured to prevent access to the one or more sub-devices when the one or more access locks are engaged. Access to the one or more sub-devices is not allowed when the lock override bit is set. The method includes requesting a memory transaction for one or more memory addresses and determining a lock status for the one or more memory addresses. The method also includes returning the lock status for the one or more memory addresses. The method may determine if the lock status for the one or more memory address can be changed. The method may change the lock status of the one or more memory addresses to allow the memory transaction.
47 Citations
36 Claims
-
1. A system, comprising:
-
a processor configured to operate in an operating mode, wherein the operating mode is one of a plurality of operating modes including a secure operating mode; one or more secured assets coupled to the processor; and security hardware configured to control access to the secured assets dependant upon the operating mode of the processor, wherein the security hardware is configured to allow access to the secure assets in the secure operating mode, and wherein the security hardware includes a lock override register configured to deny access to the secure assets when a lock override bit is set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for providing access to secured assets in a computer system, the method comprising:
-
operating the computer system in a first operating mode different from a secure operating mode; restricting access to the secured assets in response to the computer system being in the first operating mode; and determining if the secured assets would be accessible if the computer system were in the secure operating mode; requesting access to the secured assets while in the first operating mode; receiving access to the secured assets while in the first operating mode; and permitting access to the secured assets in response to receiving access to the secured assets while in the first operating mode. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer readable program storage device encoded with instructions that, when executed by a computer system performs a method for providing access to secured assets in the computer system, the method comprising:
-
operating the computer system in a first operating mode different from a secure operating mode; restricting access to the secured assets in response to the computer system being in the first operating mode; and determining if the secured assets would be accessible if the computer system were in the secure operating mode; requesting access to the secured assets while in the first operating mode; receiving access to the secured assets while in the first operating mode; and permitting access to the secured assets in response to receiving access to the secured assets while in the first operating mode. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
Specification