Securely Booting a Service Processor and Monitoring Service Processor Integrity

Mechanisms for booting a service processor are provided. With these mechanisms, the service processor executes a secure boot operation of secure boot firmware to boot an operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Callaghan, Patrick J, Valentine, Brian D, Safford, David R, Pendarakis, Dimitrios, Goldman, Kenneth A, Palmer, Elaine R, Wilson, George C, Hunt, Guerney D.H, Zohar, Miriam
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Callaghan, Patrick J
Valentine, Brian D
Safford, David R
Pendarakis, Dimitrios
Goldman, Kenneth A
Palmer, Elaine R
Wilson, George C
Hunt, Guerney D.H
Zohar, Miriam
description Mechanisms for booting a service processor are provided. With these mechanisms, the service processor executes a secure boot operation of secure boot firmware to boot an operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of a tamper-resistant secure trusted dedicated microprocessor of the service processor. The operating system kernel executing in the service processor enables an integrity management subsystem of the operating system kernel which records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020117806A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020117806A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020117806A13</originalsourceid><addsrcrecordid>eNrjZPAPTk0uLUrNqVRwys8vycxLV0hUCE4tKstMTlUIKMpPTi0uzi9SSMxLUfDNz8ssyS8CKcFU4JlXkppelFlSycPAmpaYU5zKC6W5GZTdXEOcPXRTC_LjU4sLEpNT81JL4kODjQyMDAwNzS0MzBwNjYlTBQA28Tf5</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Securely Booting a Service Processor and Monitoring Service Processor Integrity</title><source>esp@cenet</source><creator>Callaghan, Patrick J ; Valentine, Brian D ; Safford, David R ; Pendarakis, Dimitrios ; Goldman, Kenneth A ; Palmer, Elaine R ; Wilson, George C ; Hunt, Guerney D.H ; Zohar, Miriam</creator><creatorcontrib>Callaghan, Patrick J ; Valentine, Brian D ; Safford, David R ; Pendarakis, Dimitrios ; Goldman, Kenneth A ; Palmer, Elaine R ; Wilson, George C ; Hunt, Guerney D.H ; Zohar, Miriam</creatorcontrib><description>Mechanisms for booting a service processor are provided. With these mechanisms, the service processor executes a secure boot operation of secure boot firmware to boot an operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of a tamper-resistant secure trusted dedicated microprocessor of the service processor. The operating system kernel executing in the service processor enables an integrity management subsystem of the operating system kernel which records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200416&amp;DB=EPODOC&amp;CC=US&amp;NR=2020117806A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25562,76317</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200416&amp;DB=EPODOC&amp;CC=US&amp;NR=2020117806A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Callaghan, Patrick J</creatorcontrib><creatorcontrib>Valentine, Brian D</creatorcontrib><creatorcontrib>Safford, David R</creatorcontrib><creatorcontrib>Pendarakis, Dimitrios</creatorcontrib><creatorcontrib>Goldman, Kenneth A</creatorcontrib><creatorcontrib>Palmer, Elaine R</creatorcontrib><creatorcontrib>Wilson, George C</creatorcontrib><creatorcontrib>Hunt, Guerney D.H</creatorcontrib><creatorcontrib>Zohar, Miriam</creatorcontrib><title>Securely Booting a Service Processor and Monitoring Service Processor Integrity</title><description>Mechanisms for booting a service processor are provided. With these mechanisms, the service processor executes a secure boot operation of secure boot firmware to boot an operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of a tamper-resistant secure trusted dedicated microprocessor of the service processor. The operating system kernel executing in the service processor enables an integrity management subsystem of the operating system kernel which records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPAPTk0uLUrNqVRwys8vycxLV0hUCE4tKstMTlUIKMpPTi0uzi9SSMxLUfDNz8ssyS8CKcFU4JlXkppelFlSycPAmpaYU5zKC6W5GZTdXEOcPXRTC_LjU4sLEpNT81JL4kODjQyMDAwNzS0MzBwNjYlTBQA28Tf5</recordid><startdate>20200416</startdate><enddate>20200416</enddate><creator>Callaghan, Patrick J</creator><creator>Valentine, Brian D</creator><creator>Safford, David R</creator><creator>Pendarakis, Dimitrios</creator><creator>Goldman, Kenneth A</creator><creator>Palmer, Elaine R</creator><creator>Wilson, George C</creator><creator>Hunt, Guerney D.H</creator><creator>Zohar, Miriam</creator><scope>EVB</scope></search><sort><creationdate>20200416</creationdate><title>Securely Booting a Service Processor and Monitoring Service Processor Integrity</title><author>Callaghan, Patrick J ; Valentine, Brian D ; Safford, David R ; Pendarakis, Dimitrios ; Goldman, Kenneth A ; Palmer, Elaine R ; Wilson, George C ; Hunt, Guerney D.H ; Zohar, Miriam</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020117806A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Callaghan, Patrick J</creatorcontrib><creatorcontrib>Valentine, Brian D</creatorcontrib><creatorcontrib>Safford, David R</creatorcontrib><creatorcontrib>Pendarakis, Dimitrios</creatorcontrib><creatorcontrib>Goldman, Kenneth A</creatorcontrib><creatorcontrib>Palmer, Elaine R</creatorcontrib><creatorcontrib>Wilson, George C</creatorcontrib><creatorcontrib>Hunt, Guerney D.H</creatorcontrib><creatorcontrib>Zohar, Miriam</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Callaghan, Patrick J</au><au>Valentine, Brian D</au><au>Safford, David R</au><au>Pendarakis, Dimitrios</au><au>Goldman, Kenneth A</au><au>Palmer, Elaine R</au><au>Wilson, George C</au><au>Hunt, Guerney D.H</au><au>Zohar, Miriam</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Securely Booting a Service Processor and Monitoring Service Processor Integrity</title><date>2020-04-16</date><risdate>2020</risdate><abstract>Mechanisms for booting a service processor are provided. With these mechanisms, the service processor executes a secure boot operation of secure boot firmware to boot an operating system kernel of the service processor. The secure boot firmware records first measurements of code executed by the secure boot firmware when performing the boot operation, in one or more registers of a tamper-resistant secure trusted dedicated microprocessor of the service processor. The operating system kernel executing in the service processor enables an integrity management subsystem of the operating system kernel which records second measurements of software executed by the operating system kernel, in the one or more registers of the tamper-resistant secure trusted dedicated microprocessor.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2020117806A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Securely Booting a Service Processor and Monitoring Service Processor Integrity
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T11%3A18%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Callaghan,%20Patrick%20J&rft.date=2020-04-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020117806A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true