METHOD FOR SECURE EXTENSION OF FUNCTIONS OF INFORMATION SECURITY HARDWARE Russian patent published in 2016 - IPC G06F12/14 

Abstract RU 2574347 C2

FIELD: information technology.

SUBSTANCE: method for the secure extension of functions of information security equipment, the hardware components of which are the self-contained functionally sufficient devices which are embedded in secure computer equipment, the said devices consisting of at least nonvolatile memory which stores program modules corresponding to at least one function from the set of security functions supported by the information security equipment, and a controller through which the nonvolatile memory is accessed via trusted loading of new program modules, under control of which the required extension of security functions is provided, wherein the new program modules are stored signed by electronic signatures of the providers thereof, obtained using signature keys in storages which are external relative to the nonvolatile memory of the information security equipment; the nonvolatile memory of the information security equipment stores the database of verification keys for signatures of providers of the new program modules, and before a loading session, the loaded program modules are authenticated through a signature verification procedure.

EFFECT: providing trusted loading of new program modules.

4 cl

Similar patents RU2574347C2

Title Year Author Number
TRUSTED COMPUTING SYSTEM WITH MULTILEVEL SECURITY SYSTEM 2023
  • Konyavskij Valerij Arkadevich
  • Bukin Andrej Gennadevich
RU2816097C1
METHOD FOR PREVENTING UNAUTHORISED ACCESS TO INFORMATION STORED IN PERSONAL COMPUTER 2011
  • Grigor'Ev Grigorij Ehrkinovich
  • Konjavskij Valerij Arkad'Evich
  • Krjazhev Aleksej Sergeevich
  • Sinjakin Savelij Aleksandrovich
RU2475823C1
METHOD FOR PREVENTING UNAUTHORISED ACCESS TO INFORMATION STORED IN COMPUTER SYSTEMS 2011
  • Bazhitov Igor' Anatol'Evich
  • Konjavskaja Svetlana Valer'Evna
  • Schastnyj Dmitrij Jur'Evich
RU2470349C1
METHOD FOR PROTECTING COMPUTER 2016
  • Konyavskij Valerij Arkadevich
RU2628142C1
TRUSTED BOOT TOOL WITH BUILT-IN BINARY TRANSLATOR OF OPERATING SYSTEM AND WIRELESS CONTROL CHANNEL 2023
  • Molchanov Igor Anatolevich
  • Chuchko Pavel Aleksandrovich
  • Bychkov Ignat Nikolaevich
  • Lobanov Igor Nikolaevich
  • Korenev Pavel Valerevich
  • Mikhajlova Irina Aleksandrovna
RU2820971C1
COMPACT HARDWARE ELECTRONIC MEDIA OF INFORMATION WITH MULTI-LEVEL REGULATION OF ACCESS TO SEPARATE MEMORY SECTIONS 2016
  • Gruzdev Sergej Lvovich
  • Sabanov Aleksej Gennadevich
  • Kryachkov Anton Viktorovich
  • Demchenko Konstantin Olegovich
RU2635027C1
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS 2014
  • Dudarev Dmitrij Aleksandrovich
  • Kravtsov Aleksej Jur'Evich
  • Poletaev Vladimir Mikhajlovich
  • Poltavtsev Aleksandr Vasil'Evich
  • Romanets Jurij Vasil'Evich
  • Syrchin Vladimir Kimovich
RU2569577C1
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN 2016
  • Sprague, Michael
  • Sprague, Steven
RU2673842C1
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS 2013
  • Dudarev Dmitrij Aleksandrovich
  • Poletaev Vladimir Mikhajlovich
  • Poltavtsev Aleksandr Vasil'Evich
  • Romanets Jurij Vasil'Evich
  • Syrchin Vladimir Kimovich
RU2538329C1
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE 2016
  • Radajkin Aleksej Gennadevich
  • Sachkov Evgenij Anatolevich
RU2635269C1

RU 2 574 347 C2

Authors

Altukhov Andrej Andreevich

Konjavskij Valerij Arkad'Evich

Schastnyj Dmitrij Jur'Evich

Dates

2016-02-10Published

2014-04-21Filed