FIELD: information technology.
SUBSTANCE: method for the secure extension of functions of information security equipment, the hardware components of which are the self-contained functionally sufficient devices which are embedded in secure computer equipment, the said devices consisting of at least nonvolatile memory which stores program modules corresponding to at least one function from the set of security functions supported by the information security equipment, and a controller through which the nonvolatile memory is accessed via trusted loading of new program modules, under control of which the required extension of security functions is provided, wherein the new program modules are stored signed by electronic signatures of the providers thereof, obtained using signature keys in storages which are external relative to the nonvolatile memory of the information security equipment; the nonvolatile memory of the information security equipment stores the database of verification keys for signatures of providers of the new program modules, and before a loading session, the loaded program modules are authenticated through a signature verification procedure.
EFFECT: providing trusted loading of new program modules.
4 cl
Title | Year | Author | Number |
---|---|---|---|
TRUSTED COMPUTING SYSTEM WITH MULTILEVEL SECURITY SYSTEM | 2023 |
|
RU2816097C1 |
METHOD FOR PREVENTING UNAUTHORISED ACCESS TO INFORMATION STORED IN PERSONAL COMPUTER | 2011 |
|
RU2475823C1 |
METHOD FOR PREVENTING UNAUTHORISED ACCESS TO INFORMATION STORED IN COMPUTER SYSTEMS | 2011 |
|
RU2470349C1 |
METHOD FOR PROTECTING COMPUTER | 2016 |
|
RU2628142C1 |
TRUSTED BOOT TOOL WITH BUILT-IN BINARY TRANSLATOR OF OPERATING SYSTEM AND WIRELESS CONTROL CHANNEL | 2023 |
|
RU2820971C1 |
COMPACT HARDWARE ELECTRONIC MEDIA OF INFORMATION WITH MULTI-LEVEL REGULATION OF ACCESS TO SEPARATE MEMORY SECTIONS | 2016 |
|
RU2635027C1 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN | 2016 |
|
RU2673842C1 |
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE | 2016 |
|
RU2635269C1 |
Authors
Dates
2016-02-10—Published
2014-04-21—Filed