Browse Prior Art Database

Merging BIOS options in a TCPA environment

IP.com Disclosure Number: IPCOM000016099D
Original Publication Date: 2002-Jun-15
Included in the Prior Art Database: 2003-Jun-21
Document File: 2 page(s) / 40K

Publishing Venue

IBM

Abstract

A method is disclosed for effectively merging separate BIOS elements into a system's base BIOS in a TCPA environment.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Merging BIOS options in a TCPA environment

    A method is disclosed for effectively merging separate BIOS elements into a system's base BIOS in a TCPA environment.

BIOS implementations may include code that has been delivered to system integrator as a functional component of BIOS; these components are simply merged into the system BIOS without modification. Examples of these independent code images include (but are not limited to) CPU microcode (CPU patches), video support code for onboard video subsystems, network support code for on board network attachments, logo screens, etc. When it is necessary to update one of these entities, the system integrator has traditionally included the new component into a new BIOS and released the entire BIOS to its customers. However, there are circumstances where it is desirable to update system components without updating the BIOS level. This need has lead to various schemes for merging BIOS components into existing release in the field. These have worked well until now. With the increased focus on security and authenticity checking of all system components (including BIOS), these field merging schemes must address the problem of allowing the system to verify the integrity of the merged function in addition to simply merging the new function.

The traditional method of proving authenticity of BIOS is sign the entire image. Any entity wishing to verify the integrity of the image simply checks the digital signature in the image (usually done by using an asymmetrical cryptographic process). To maintain the integrity of the image requires recalculating the signature of the image, and results in compromising the security strategy the p...