Intel Corporation
CONNECTIONLESS TRUSTED COMPUTING BASE RECOVERY
Last updated:
Abstract:
Connectionless trusted computing base recovery is described. An example of a system includes one or more processors to process data; hardware including a hardware RoT (root of trust); and firmware including a firmware TCB (trusted computing base), the firmware including the credentials including one or more certificates and one or more keys, wherein the one or more processors are to determine that the firmware TCB is compromised and that the hardware RoT is intact; issue new credentials by the hardware RoT to mutable firmware based on a version number or security version number (SVN) of the firmware; and revoke old versions of the credentials for the firmware.
Status:
Application
Type:
Utility
Filling date:
23 Jun 2021
Issue date:
14 Oct 2021