×

Secure booting a computing device

  • US 8,688,967 B2
  • Filed: 07/25/2012
  • Issued: 04/01/2014
  • Est. Priority Date: 01/07/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method, comprising:

  • executing computer program codes embedded in a secure ROM (read-only memory) of a portable device to verify a first executable code image representing a kernel of an operating system (OS) that provides an operating environment of the portable device, the first executable image being verified by;

    extracting a first signature value signed over the first executable image according to a key through hashing and encryption algorithms, the key stored within the secure ROM and uniquely identifying the portable device,determining a second signature value based on the first executable image according to the key through the hashing and encryption algorithms,comparing the first signature value to the second signature value, anddetermining that the first executable image is successfully verified when the first signature value matches the second signature value,wherein the first executable image is stored in a mass storage of the portable device; and

    upon successfully verifying the first code image, executing the first executable image in a main memory of the portable device to set up the kernel of the OS in order to establish the operating environment of the portable device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×