System and method for detecting unauthorized boots

作者: Daniel C. Deliberato , Philip John Steuart Gladstone , Alan J. Kirby

DOI:

关键词:

摘要: A system and method for detecting unauthorized boots adjusting security policy. According to one embodiment of the present invention, BIOS stores boot information in a data store from which it can later be distributed on network and/or accessed by software. The software compares signature operating booted computer trusted, or authorized, system. is capable determining whether an attempted authorized adjust policy response information.

参考文章(9)
Graeme John Proudler, Privacy of data on a computer platform ,(2002)
Bryon S. Nevis, John V. Lovelace, Operating system bootstrap security mechanism ,(1998)
Thomas R. Markham, Charles N. Payne, Jessica J. Bogle, Associative policy model ,(2002)
Richard A. Dayan, James L. Matlock, Simon C. Chu, David B. Rhoades, Method and system for restricting PXE servers ,(2003)
Randall Scott Springfield, Steven Dale Goodman, David Carroll Challener, Joseph Wayne Freeman, Apparatus, system, and method for sealing a data repository to a trusted computing platform ,(2003)
Philip C. Theiller, Kenneth Hubacher, Dennis Sposato, Pre-execution logon (PEL) ,(1999)