Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Firmware-based trusted platform module for arm processor architectures and trustzone security extensions

a technology of arm processor and trusted platform, applied in the direction of unauthorized memory use protection, instruments, error detection/correction, etc., can solve the problems of limited use, tpm chips are still vulnerable once exposed to applications, and keys are still vulnerable to applications, so as to achieve the effect of adding a cost to the system

Active Publication Date: 2013-01-31
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 174 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a way to implement a trusted execution environment (TPM) in computing devices without the need for a hardware TPM module. This is achieved by using existing hardware architectures and security extensions, allowing for a wide range of TPM usage scenarios across different devices. The "fTPM" reduces costs associated with the inclusion of a TPM by providing a software interface to the security extension functionality, while also lowering power consumption and achieving execution isolation for ensuring code and data integrity. By leveraging existing features and capabilities, the "fTPM" enables TPM ubiquity across multiple SoC platforms without requiring hardware modifications.

Problems solved by technology

More specifically, a typical TPM chip generally offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a hardware pseudo-random number generator.
However even when a TPM chip is used, keys are still vulnerable once exposed by the TPM chip to applications, as has been illustrated in the case of a conventional cold boot attack.
Unfortunately, such solutions face several challenges.
For example, integrating TPM chips into a typical motherboard design results in an increased bill of materials (BOM) cost in the order of about $1 to $2 per system.
However, even such relatively low per-device costs can add to a very large total considering the tremendous volume of computing devices being manufactured around the world.
Another challenge often associated with conventional TPM chips is that discrete TPMs are generally not optimized for energy efficiency, and can impact the power budget for low-power systems (e.g., portable computing devices, PDA's, tablets, netbooks, mobile phones, etc.).
Further, due to BOM constraints, discrete TPM chips are often implemented with relatively slow (and thus low cost) processors which negatively impacts or potentially prevents certain usage scenarios.
Consequently, because TPMs are generally considered to be optional system components, the additional monetary and power costs for including a discrete TPM in a system often leads to the exclusion of such devices during the manufacturing process.
TPMs are therefore not ubiquitous which makes it difficult for software or operating system developers to invest substantial resources in broad TPM usage scenarios.
Another issue affecting broad TPM usage scenarios is that many conventional discrete TPMs are not compatible with some form factors (e.g., phones, PDA's, tablets, etc.).
In fact, many conventional devices such as mobile phones and tablet type computers don't generally use discrete TPMs, and in some cases may not have the appropriate interconnects (e.g., an LPC bus) to support the use of discrete TPMs with the system-on-a-chip (SoC) driving devices such as phones or tablets.
Unfortunately, the TPM's broad adoption has met resistance due to a number of reasons, including, for example, the additional Bill of Materials (BOM) cost of adding a discrete TPM component to the motherboard, the cost and time of redesigning a particular device to provide the appropriate interface for connecting or adding a TPM to such devices, etc.
Unfortunately, both of these approaches incur additional cost to the system.
TrustZone™, however, is a nearly ubiquitous feature across the broad set of high-end ARM® SoC roadmaps but remains largely unused.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware-based trusted platform module for arm processor architectures and trustzone security extensions
  • Firmware-based trusted platform module for arm processor architectures and trustzone security extensions
  • Firmware-based trusted platform module for arm processor architectures and trustzone security extensions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]In the following description of the embodiments of the claimed subject matter, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific embodiments in which the claimed subject matter may be practiced. It should be understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the presently claimed subject matter.

[0026]1.0 Introduction:

[0027]In general, as with a conventional hardware TPM, a “Firmware-Based TPM” or “fTPM,” as described herein, ensures that it preserve its code and data integrity and confidentiality from all other software running in the system to prevent a wide variety of potential security breaches as well as enabling a wide variety of security application (e.g., cryptographic applications, secure random number generation, disk / file encryption, password authentication, etc.). Isolation can be implemented with a dedicated security pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices.

Description

BACKGROUND[0001]1. Technical Field[0002]A “Firmware-Based TPM” or “fTPM” provides various techniques for using hardware such as the ARM® architecture's TrustZone™ extensions and security primitives to provide secure execution isolation for a Trusted Platform Module (TPM) within a “firmware-based TPM” that can be implemented within devices using existing ARM®-based processor architectures or similar hardware.[0003]2. Background Art[0004]As is well known to those skilled in the art, a conventional Trusted Platform Module (TPM) is a hardware device or “chip” that provides a secure crypto-processor. More specifically, a typical TPM chip generally offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a hardware pseudo-random number generator. It also includes capabilities such as “remote attestation” and sealed storage. Remote attestation is intended to create a practically unforgeable hash key summary of a particular hardware and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
CPCG06F21/57G06F21/575G06F21/74G06F21/572G06F21/71G06F21/46G06F21/53G06F21/552G06F2221/034
Inventor THOM, STEFANCOX, JEREMIAHLINSLEY, DAVIDNYSTROM, MAGNUSRAJ, HIMANSHUROBINSON, DAVIDSAROIU, STEFANSPIGER, ROBWOLMAN, ALASTAIR
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products