The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 08, 2015

Filed:

Dec. 03, 2012
Applicant:

Imation Corp., Oakdale, MN (US);

Inventor:

Laurence Hamid, Ottawa, CA;

Assignee:

Imation Corp., Oakdale, MN (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 9/24 (2006.01); G06F 15/177 (2006.01); G06F 21/57 (2013.01); G06F 21/56 (2013.01); G06F 11/10 (2006.01); H04L 29/06 (2006.01); G06F 12/02 (2006.01); G06F 17/30 (2006.01);
U.S. Cl.
CPC ...
G06F 21/575 (2013.01); G06F 21/568 (2013.01); G06F 11/1008 (2013.01); G06F 12/0246 (2013.01); G06F 17/30371 (2013.01); H04L 63/123 (2013.01);
Abstract

Booting an operating system that includes a secure preboot environment that performs integrity checks against security threats. A computer system boots to a preboot environment, which performs integrity checks and other anti-malware operations. Once the preboot environment finishes, the system reboots into a regular environment. The preboot environment can reside on a secure portion of a flash memory, with a computer system booting therefrom; or the preboot environment can reside securely in the computer system. The preboot environment includes integrity checks for a regular environment, and anti-malware programming. Once the preboot environment is done, the computer system reboots into a regular environment, such as from the flash memory or on the computer system. The integrity checks confirm that files in the regular environment are unchanged or uninfected. The integrity checks include determining the accuracy of a trusted system configuration on the computer system, such as using a TPM.


Find Patent Forward Citations

Loading…