TECHNIQUES FOR COORDINATING DEVICE BOOT SECURITY

Various embodiments are generally directed to techniques for coordinating the formation of a chain of trust among components of a processing device. An apparatus may include a processor component including verification microcode to authenticate a verification routine based on a first security creden...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZIMMER, Vincent, J, YAO, Jiewen
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Various embodiments are generally directed to techniques for coordinating the formation of a chain of trust among components of a processing device. An apparatus may include a processor component including verification microcode to authenticate a verification routine based on a first security credential to create a chain of trust within a processing device that includes the verification microcode and the verification routine; a collecting register to provide a hash value of one or more values written to the collecting register since initialization of the processing device when read; and a verification component of the verification routine to determine a selected security level of the initialization, and based on the selected security level, to authenticate a firmware based on a second security credential to extend the chain of trust to include the firmware and store an indication of a result of the attempted authentication of the firmware in the collecting register.