G06F21/572

TRANSPORT ONBOARD SECURITY CHECK
20230048368 · 2023-02-16 ·

An example operation includes one or more of saving a hash of data including occupant data and transport data on a transport in response to the transport is started, performing a security check that validates the hash of data against the data in response to the transport is started, and providing a resolution when the security check fails.

COMPONENT ACCESS TO ROM-STORED FIRMWARE CODE OVER FIRMWARE CONTROLLER EXPOSED VIRTUAL ROM LINK

A read-only memory (ROM) stores firmware code for a hardware component. A firmware controller is directly physically connected to the hardware component and to the ROM. The firmware controller exposes a virtual ROM link to the hardware component. The hardware component accesses the firmware code over the virtual ROM link exposed by the firmware controller.

CORRELATION OF A VIRTUAL MACHINE TO A HOST WITHIN A VIRTUAL DOMAIN

Aspects of the subject disclosure may include, for example, identifying a request to install a guest virtual machine on a physical host; identifying a UUID of the physical host; generating a virtual machine reference value; defining a modified UUID of the guest virtual machine comprising the UUID of the physical host and the virtual machine reference value; and assigning the modified UUID to the guest virtual machine, the physical host being identifiable via the modified UUID of the guest virtual machine. Other embodiments are disclosed.

Secure Firmware Update through a Predefined Server
20230046674 · 2023-02-16 ·

The disclosed embodiments relate to securely booting firmware images. In one embodiment, a method is disclosed comprising receiving, by a memory device, a firmware update; validating, by the memory device, a signature associated with the firmware update; copying, by the memory device, an existing firmware image to an archive location, the archive location storing a plurality of firmware images sorted by version identifiers; booting, by the memory device, and executing the firmware update; and replacing, by the memory device, the firmware update with the existing firmware image stored in the archive location upon detecting an error while booting the firmware update.

Hybrid firmware code protection

A firmware protection module implements a hybrid firmware protection scheme on a computing device. The firmware protection module intercepts a message from a processor to a memory of the computing device. The message includes a command and an address in the memory corresponding to a firmware module stored in the module. The firmware protection module determines whether the command in the message is prohibited and whether the address in the message is protected. Responsive to a determination that the command is prohibited and the address is protected, the firmware protection module prevents at least a portion of the message from reaching the memory.

Split chain of trust for secure device boot
11580227 · 2023-02-14 · ·

The secure chain of trust steps to boot-up a computing device are split between the shutdown procedure of the computing device and the boot-up procedure of the computing device to reduce the time required for the computing device to boot-up. The main image associated with a central processing unit of the computing device is validated during the shutdown procedure of the computing device such that the operating system for the central processing unit is available when the computing device receives an action to power on. The boot-up time for the computing device is reduced, which allows the computing device to boot-up within an established time frame.

SECURE GUEST IMAGE AND METADATA UPDATE
20230040577 · 2023-02-09 ·

A secure guest generates an updated image for the secure guest, and computes one or more measurements for the updated image. The secure guest provides the one or more measurements to a trusted execution environment and obtains from the trusted execution environment metadata for the updated image. The metadata is generated based on metadata of the secure guest and obtaining the one or more measurements.

DISTRIBUTED VEHICLE COMPUTING
20230042500 · 2023-02-09 · ·

A vehicle identifier and a nonfungible token (NFT) associated with the vehicle identifier are stored on an electronic ledger. The electronic ledger is a distributed electronic ledger shared between at least a computer and a remote computer. Upon transitioning a vehicle to an on state, the electronic ledger is queried to identify programming instructions associated with the NFT. Upon retrieving the identified programming instructions from the electronic ledger, the vehicle is actuated based on the retrieved programming instructions.

Method for secure booting using route switchover function for boot memory bus and apparatus using the same

Disclosed herein are a method for secure booting using a route switchover function for a boot memory bus and an apparatus using the same. The method includes maintaining a reset state in order to prevent a processor from being booted, interrupting the connection between the processor and boot memory, verifying the integrity of first boot firmware stored in the boot memory, determining whether hardware damage is detected, and releasing the reset state of the processor and the interrupted state of the connection between the processor and the boot memory in consideration of whether hardware damage is detected and verification of the integrity in order to allow the processor to be booted.

SOC-assisted resilient boot

Systems, apparatuses and methods may provide for technology that assumes, by a root of trust located in a trusted region of a system on chip (SOC), control over a reset of the SOC and conducting, by the root of trust, an authentication of an update package in response to an update condition. The root of trust technology may also apply the update package to firmware located in non-volatile memory (NVM) associated with a microcontroller of the SOC if the authentication is successful.