Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Hard drive boot tracking with secure network

IP.com Disclosure Number: IPCOM000147475D
Original Publication Date: 2007-Mar-16
Included in the Prior Art Database: 2007-Mar-16
Document File: 1 page(s) / 20K

Publishing Venue

Lenovo

Abstract

Today , if a system is booted outside of a secure network the data on the system is suspect since the malicious data can be inserted on the hard drive. On today's systems there is a method to track the location of where the system was booted. The weak point of this implementation is that it requires NVRAM which could potentially be reset by the malicious program thereby removing the information that the system was booted outside the secure network. What is needed is a more secure method of tracking the system boot locations.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Hard drive boot tracking with secure network

     Two items will be added to achieve this task. First, a monotonic counter which is incremented each time the hard drive is turned on will be added to the harddrive controller. Secondarily, the code which controls access to the network will be modified to control access to the network depending on querying this new harddrive counter. Before a system is allowed onto the network, code will run on the client which reads the monotonic counter on the hardfile and sends this data to the network (with the network password). The logon manager will read the last value of the counter and read the current counter. If they are not equal, the hardfile has been accessed outside the control of the network . Since there can be malicious data inserted onto the drive, the proposal would be to then apply security policy to the drive (virus scan, reformat drive,
...) before the system is allowed back onto the network. Because data sent from the hardfile can be secured via using known methods of encryption the transmission can be secured and non hackable.

1