EP2834764A1 - Procede de securisation d'acces a un dispositif informatique - Google Patents
Procede de securisation d'acces a un dispositif informatiqueInfo
- Publication number
- EP2834764A1 EP2834764A1 EP13719970.9A EP13719970A EP2834764A1 EP 2834764 A1 EP2834764 A1 EP 2834764A1 EP 13719970 A EP13719970 A EP 13719970A EP 2834764 A1 EP2834764 A1 EP 2834764A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- computing device
- remote server
- operating system
- data
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Definitions
- the present invention relates to methods for securing access to a computing device so as to be able to integrate it into cloud computing.
- Cloud Computing is a concept for remote storage of computer storage and processing traditionally located on local servers or on a computing device. Specifically according to the National Institute of Standards and Technology (NIST), Cloud Computing is the on-demand, self-service network access to virtualized and shared computing resources.
- cloud computing can be defined by: virtual computing, cloud computing, cloud computing, cloud computing, or cloud computing.
- the present invention thus aims to solve the problems resulting from the disadvantages of the state of the art, so as to make computing compatible with the ambitions of "cloud computing” by allowing an integrity check of the sealed material, the operating system, and de-correlated authentication and hardware and the user much more satisfactorily before starting the main operating system.
- the invention proposes to improve the implementation of mechanisms to enhance the security related to the access of computing devices and reduce the probability of "success” of the attacks, for example in the form of malware, or by identity theft or physical backdooring. All the while allowing a disjoint authentication of the material and the users, compatible with the creation of a secure network physically distributed ("cloud Computing").
- one aspect of the invention relates to a method of securing access to a computing device comprising a step of establishing a secure connection and authentication of said computing device and the user of that computing device to a remote server in which said steps of establishing a secure connection and authentication are performed while executing instructions included in a data set adapted to implement the pre-startup of the computing device before the operation of the boot loader of the operating system of said computing device.
- the step of establishing a secure connection between said computing device and the remote server is performed during the execution of said instructions for encrypting the exchanged data;
- the authentication step comprises a substep of exchange between the computing device and the remote server of identification elements to mutually authenticate said computing device and the remote server.
- the authentication step comprises the following substeps:
- the method comprises a step of determining identification data of the data set on the basis of which the remote server triggers an update of said data set adapted to implement the pre ⁇ startup of the computing device before running the loader booting the operating system of said computing device.
- the game data suited to implement the pre ⁇ start computing device before running the boot loader of the operating system of said computer device refers to a code selected from the following codes:
- the method of securing access is implemented by a remote server and a computing device.
- this computer device corresponds, in a nonlimiting manner, to all devices comprising:
- Processing means at least one microprocessor, and memory means (volatile memory and / or non-volatile and / or mass); input means, such as a keyboard and / or a mouse and / or touch screen, or voice control means; display means;
- USB port USB port ...
- biometric sensor fingerprint, iris, facial recognition ...
- the means of communication of this device relate for example to the following technologies and / or standards:
- WI-FI abbreviation of wirelessfidelity
- Wimax abbreviation of wirelessfidelity
- GPRS General Packet Radio Service
- GSM Global System for Mobile communications
- UMTS Universal Mobile Communications
- HSDPA Home Location System
- IMS IP MultimediaSubsystem
- Ethernet Gigabit Ethernet.
- This computing device is said to be physically sealed, that is, it can not be opened without physically damaging it. It is for example possible that it is hermetically filled with a gas such as argon or other non-toxic inert gas, and to couple the start button of the boot of this device to a chemical detector verifying that the composition of the gas inside the computer is unchanged.
- a gas such as argon or other non-toxic inert gas
- Other solutions based on special glues also exist, where chassis conductivity measurements such as unscrewing a computer screw makes it unusable.
- This computing device also comprises a storage means such as a hard disk containing a partition comprising an operating system and a boot loader of said operating system encrypted according to a symmetric encryption algorithm of AES type (acronym for Advanced Encryption). Standard which means in standard French advanced encryption).
- AES symmetric encryption algorithm
- Standard which means in standard French advanced encryption.
- the processing means of this computing device are able to implement a computer code relating to an algorithm corresponding to a computer program, stored in the memory means of the computing device, comprising instructions capable of performing the necessary processing for performing the steps of the method according to one embodiment of the invention.
- This code relates for example to a data set capable of implementing the pre-startup of the computing device.
- pre-start the sequences start up before running the boot loader of the operating system ("bootloader").
- this data set corresponds, for example, to the BIOS (acronym for Basic Input Output System), or to EFI (acronym for Extensible Firmware Interface, which stands for unified extensible firmware in French). ), or UEFI (acronym for Unified Extensible Firmware Interface which stands for Unified Extensible Firmware Interface) or any device firmwares of said computing device (eg ISA, PCI or PCI Express).
- firmware refers to any firmware, or internal software or embedded software. It refers to a set of instructions and data structures that are embedded in computer hardware whether it is a computing device or a device of that device. In the case of the BIOS it is contained in the memory means of the device, for example a read-only memory (ROM) of the motherboard of this device.
- ROM read-only memory
- BIOS allows you to perform basic operations when powering on the device, such as hardware recognition ("BIOS"
- this device when the user turns on the computing device, this device must first be authenticated to a remote server before any other operation.
- the authentication step implemented in the method of securing access to this computing device is performed in "pre-startup", that is to say from the BIOS or EFI or UEFI or the firmware of a device, and before passing the control to the boot loader of the operating system (in English “bootloader”). Indeed in the state of the art any identification of this type is performed from the operating system, that is to say much later.
- the method of securing access to a computing device comprises a step of establishing a secure connection and an authentication of the computing device and the user of this computing device to a remote server.
- BIOS or EFI or UEFI or the firmware of a device performs a checksum or "checksum" of the physical integrity of all the firmware present: BIOS or EFI or UEFI or the firmware of a device (cf TrustedComputing: the mechanism is the same).
- the step of establishing a secure connection between said computing device and the remote server is performed during the execution of said instructions for encrypting the exchanged data.
- the BIOS or EFI or UEFI or the firmware of a device includes a module capable of to make a secure connection via for example Kerberos.
- Kerberos is a network authentication protocol that relies on a secret key mechanism (symmetric encryption) and the use of tickets. Any other protocol and public key / private key algorithm is also usable.
- HSM pair (acronym for Hardware Security Module meaning in French Hardware Security Module and a random generator in the form of a physical device (or their equivalent in the form of a TPM cyptoprocessor acronym for Trusted Platform Module and pertaining to a hardware cryptographic component).
- the mutual authentication of the computing device with the remote server and that of the user is performed using a strong asymmetric algorithm, such as RSA (Rivest Shamir Adleman) or DSA key pairs. example (from TPM / HSM) as a certificate.
- RSA Raster Shamir Adleman
- DSA key pairs for example (from TPM / HSM) as a certificate.
- the authentication step is implemented as soon as the connection between the computing device and the remote server is established.
- This authentication step includes a first substep corresponding to an exchange by both the computer device and remote server of identification elements, such as a key, for mutually authenticating said computing device and the remote server.
- the computing device is turned off by executing instructions included in the dataset.
- the remote server if it does not recognize the validity of the key presented using its public key, then interrupts the connection. In this case, the BIOS / EFI or its extension performs a "shutdown". In practice, this is enough to make the computer device completely unusable (the main operating system is never started, the data of the user never decrypted).
- the method comprises a step of determining identification data of the data set, for example the version of the firmware of the BIOS, on the basis of which the remote server triggers an update of said data set, able to set implement the pre-startup of the computing device, that is to say the update of the BIOS or EFI or UEFI or the firmware of a device.
- the method makes it possible to check whether the BIOS or the EFI or the UEFI or the firmware of a device must be flashed or is up to date.
- the computer device then realizes a checksum (in English "checksum") of the BIOS or the EFI or the UEFI and all the firmware of all the peripherals and verifies its integrity (TPM supports at least SHA1, on can do the same with an HSM that supports better algorithms such as SHA256).
- checksum in English "checksum”
- the firmware version of the BIOS or EFI or UEFI or the firmware of a device is present hard (hardcoded) in the firmware.
- the computing device sends the version of its firmware to the server.
- the server compares it with the latest version available. If it is up to date: nothing is done then. Otherwise, the remote server sends a mini bootloader
- boot loader able to flash the firmware in question as well as a new version of the firmware via the established secure connection.
- the computer device downloads this mini bootloader, executes it, which has the effect of flashing the firmware. Then it resigns and reseal the HSM / TPM with its new sum of hashes and performs a cold restart ("cold reboot").
- the method comprises a step of performing a checksum of the partition of the storage means comprising an operating system and the boot loader of said operating system so as to obtain a hash value on the basis of from which the remote server triggers an update of the operating system.
- the method offers the advantage of being able to check the integrity of the partition of the storage means, for example a hard disk, and that the latter does not require updating.
- the computer device realizes a checksum (TPM supports SHAL, it can be done with an HSM + entropy generator) of the partition of the hard disk including the operating system and the boot loader said operating system (bootloader) encrypted via AES.
- the temporary data of the operating system (/ tmp or / var under Unix / Linux, swap, temporary files etc are not placed in this partition but considered as part of the user's "data", thus placed on the support intended for this purpose). It sends the hash value to the remote server via the encrypted connection.
- the remote server compares this hash value with the current version of the operating system that it maintains. If the hash value is different, then the remote server responds to the computing device with a message containing an update command (equivalent to "not good! Download new operating system” in French "Not good! Download new operating system And sends to the computing device a new copy of the updated operating system always encrypted via AES. The integrity of the operating system and the boot loader is assured. If the version of the operating system is up to date, the server simply sends a continuation message (equivalent to "operating system updated, continued").
- the operating system is not present in the memory means of the computing device and is then downloaded from the remote server at each start of the computer device.
- This is particularly suited for Gigabit network access and operating system downloads from the local area network (eg Storage Area Network (SAN), a storage area network that is specialized to pool storage resources ).
- SAN Storage Area Network
- This authentication step comprises another sub-step corresponding to the reception by the computer device of the remote server of a symmetric cryptographic key (typically AES) capable of enabling the decryption of a partition of a storage means of said device comprising an operating system and boot loader of said operating system.
- AES symmetric cryptographic key
- the server sends the AES key to the computing device.
- the computing device can then technically decrypt the operating system on the fly, but does not do anything until the user is authenticated.
- This authentication step also comprises a substep corresponding to the sending by the computing device to the remote server of identification data of a user of said computing device. For example, the user enters his biometric coordinates via the dedicated sensor integrated in the computing device (eg: fingerprint).
- the BIOS or the EFI or the UEFI or the firmware of a device establishes a connection via Kerberos for example within the secure connection to the remote server.
- the BIOS or the EFI or the UEFI or the firmware of a device decrypts the partition "data" possibly contained on the USB key of the user (a second partition or a second hard disk integrated to the computer is also possible ).
- This authentication step comprises another sub-step corresponding to the decryption of the content of said partition from the cryptographic key (private key associated with the user, generated from its biometric data) and the execution of the datalogger. booting said operating system.
- BIOS or the EFI or the UEFI or the firmware of a device checks the integrity of the operating system and the boot loader and transfers the execution to the bootloader, which itself starts the operating system.
- said computing device is turned off by the execution of instructions included in the data set if the data identification of the user of said computing device are invalid. Indeed, if it appears during the step of comparing the biometric data of the user to the list of authorized users, that these data are not valid then the user is not authorized and the remote server returns a message "user not accepted" to the computing device, which then performs a "shutdown".
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1253173A FR2989197B1 (fr) | 2012-04-05 | 2012-04-05 | Procede de securisation d'acces a un dispositif informatique |
PCT/FR2013/050728 WO2013150238A1 (fr) | 2012-04-05 | 2013-04-02 | Procede de securisation d'acces a un dispositif informatique |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2834764A1 true EP2834764A1 (fr) | 2015-02-11 |
Family
ID=48237119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13719970.9A Withdrawn EP2834764A1 (fr) | 2012-04-05 | 2013-04-02 | Procede de securisation d'acces a un dispositif informatique |
Country Status (4)
Country | Link |
---|---|
US (1) | US9866553B2 (fr) |
EP (1) | EP2834764A1 (fr) |
FR (1) | FR2989197B1 (fr) |
WO (1) | WO2013150238A1 (fr) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9244605B2 (en) | 2011-05-31 | 2016-01-26 | Apple Inc. | Devices, methods, and graphical user interfaces for document manipulation |
CN104573474B (zh) * | 2014-09-10 | 2019-01-11 | 中电科技(北京)有限公司 | 一种基于uefi的身份标识生成系统和方法 |
US20170099330A1 (en) * | 2015-10-06 | 2017-04-06 | Joseph Hobart | Cellular streaming entertainment system |
US10078748B2 (en) * | 2015-11-13 | 2018-09-18 | Microsoft Technology Licensing, Llc | Unlock and recovery for encrypted devices |
US20180204007A1 (en) * | 2017-01-13 | 2018-07-19 | Vormetric, Inc. | Bootloader level encryption for system boot data |
US9817675B1 (en) * | 2017-01-31 | 2017-11-14 | Hytrust, Inc. | Methods and systems for attaching an encrypted data partition during the startup of an operating system |
CA3073751C (fr) * | 2017-09-06 | 2023-08-15 | Absolute Software Corporation | Interface de micrologiciel securisee |
US10614254B2 (en) * | 2017-12-12 | 2020-04-07 | John Almeida | Virus immune computer system and method |
US11200065B2 (en) | 2017-12-15 | 2021-12-14 | Hewlett-Packard Development Company, L.P. | Boot authentication |
CN107944279A (zh) * | 2017-12-19 | 2018-04-20 | 郑州云海信息技术有限公司 | 基于uefi的bios漏洞扫描装置及扫描方法 |
US10855674B1 (en) * | 2018-05-10 | 2020-12-01 | Microstrategy Incorporated | Pre-boot network-based authentication |
CN109101246A (zh) * | 2018-07-25 | 2018-12-28 | 郑州云海信息技术有限公司 | 一种云平台的部署方法 |
WO2021216030A1 (fr) * | 2020-04-20 | 2021-10-28 | Hewlett-Packard Development Company, L.P. | Déchiffrement de connexion à distance |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5937063A (en) * | 1996-09-30 | 1999-08-10 | Intel Corporation | Secure boot |
US6327660B1 (en) * | 1998-09-18 | 2001-12-04 | Intel Corporation | Method for securing communications in a pre-boot environment |
US20030115471A1 (en) * | 2001-12-19 | 2003-06-19 | Skeba Kirk W. | Method and apparatus for building operational radio firmware using incrementally certified modules |
US20060056630A1 (en) * | 2004-09-13 | 2006-03-16 | Zimmer Vincent J | Method to support secure network booting using quantum cryptography and quantum key distribution |
US7770000B2 (en) * | 2005-05-02 | 2010-08-03 | International Business Machines Corporation | Method and device for verifying the security of a computing platform |
WO2008024135A2 (fr) * | 2005-12-09 | 2008-02-28 | Signacert, Inc. | Procédé de vérification de l'intégrité de composants sur une plate-forme de confiance à l'aide de services de base de données d'intégrité |
WO2008009112A1 (fr) * | 2006-07-18 | 2008-01-24 | Certicom Corp. | système et procédé pour authentifier un dispositif de jeu |
US7668945B2 (en) * | 2006-08-18 | 2010-02-23 | Intel Corporation | Network booting using a platform management coprocessor |
US20080082680A1 (en) * | 2006-09-29 | 2008-04-03 | Karanvir Grewal | Method for provisioning of credentials and software images in secure network environments |
US7991989B2 (en) * | 2007-12-20 | 2011-08-02 | Dell Product L.P. | System and method for OS boot image provisioning based on user identity to enable mobile users |
US8793796B2 (en) * | 2008-01-09 | 2014-07-29 | Microsoft Corporation | Booting a device from a trusted environment responsive to device hibernation |
JP5111129B2 (ja) * | 2008-01-22 | 2012-12-26 | キヤノン株式会社 | 情報処理装置、情報処理システム、情報処理方法、及び、プログラム |
US8630415B2 (en) * | 2008-01-25 | 2014-01-14 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for authentication service application processes during service reallocation in high availability clusters |
CN101247416A (zh) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | 基于ota的固件下载方法、预处理方法、完整性验证方法 |
US20100008510A1 (en) * | 2008-07-10 | 2010-01-14 | Zayas Fernando A | Method And System For Secure Download Of Firmware |
US8127146B2 (en) * | 2008-09-30 | 2012-02-28 | Microsoft Corporation | Transparent trust validation of an unknown platform |
US20100082960A1 (en) * | 2008-09-30 | 2010-04-01 | Steve Grobman | Protected network boot of operating system |
US20100122076A1 (en) * | 2008-09-30 | 2010-05-13 | Aristocrat Technologies Australia Pty Limited | Security method |
US20100082963A1 (en) * | 2008-10-01 | 2010-04-01 | Chun Hui Li | Embedded system that automatically updates its software and the method thereof |
US8086839B2 (en) * | 2008-12-30 | 2011-12-27 | Intel Corporation | Authentication for resume boot path |
US8856512B2 (en) * | 2008-12-30 | 2014-10-07 | Intel Corporation | Method and system for enterprise network single-sign-on by a manageability engine |
US20100299510A1 (en) * | 2009-05-19 | 2010-11-25 | Chip Ueltschey | Bluetooth pre-boot authentication in bios |
US8296579B2 (en) * | 2009-11-06 | 2012-10-23 | Hewlett-Packard Development Company, L.P. | System and method for updating a basic input/output system (BIOS) |
JP5493946B2 (ja) * | 2010-02-08 | 2014-05-14 | 株式会社リコー | 複合システム、セキュリティ方法、セキュリティプログラム及び記録媒体 |
US8589702B2 (en) * | 2010-05-28 | 2013-11-19 | Dell Products, Lp | System and method for pre-boot authentication of a secure client hosted virtualization in an information handling system |
US8996851B2 (en) * | 2010-08-10 | 2015-03-31 | Sandisk Il Ltd. | Host device and method for securely booting the host device with operating system code loaded from a storage device |
US20120179904A1 (en) * | 2011-01-11 | 2012-07-12 | Safenet, Inc. | Remote Pre-Boot Authentication |
-
2012
- 2012-04-05 FR FR1253173A patent/FR2989197B1/fr not_active Expired - Fee Related
-
2013
- 2013-04-02 EP EP13719970.9A patent/EP2834764A1/fr not_active Withdrawn
- 2013-04-02 US US14/390,801 patent/US9866553B2/en not_active Expired - Fee Related
- 2013-04-02 WO PCT/FR2013/050728 patent/WO2013150238A1/fr active Application Filing
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2013150238A1 * |
Also Published As
Publication number | Publication date |
---|---|
US9866553B2 (en) | 2018-01-09 |
WO2013150238A1 (fr) | 2013-10-10 |
US20150121497A1 (en) | 2015-04-30 |
FR2989197A1 (fr) | 2013-10-11 |
FR2989197B1 (fr) | 2014-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013150238A1 (fr) | Procede de securisation d'acces a un dispositif informatique | |
CN109075976B (zh) | 取决于密钥认证的证书发布 | |
US9530009B2 (en) | Secure execution and update of application module code | |
US9984236B2 (en) | System and method for pre-boot authentication of a secure client hosted virtualization in an information handling system | |
US8335931B2 (en) | Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments | |
US8874922B2 (en) | Systems and methods for multi-layered authentication/verification of trusted platform updates | |
US9336394B2 (en) | Securely recovering a computing device | |
US8639923B2 (en) | System and method for component authentication of a secure client hosted virtualization in an information handling system | |
US8230412B2 (en) | Compatible trust in a computing device | |
KR102444625B1 (ko) | 참조 플랫폼 매니페스트 및 데이터 씰링에 따른 보안 os 부팅 기법 | |
US9607156B2 (en) | System and method for patching a device through exploitation | |
US9058504B1 (en) | Anti-malware digital-signature verification | |
US9134990B2 (en) | System and method for implementing a secure client hosted virtualization service layer in an information handling system | |
US20090259855A1 (en) | Code Image Personalization For A Computing Device | |
CN112257086B (zh) | 一种用户隐私数据保护方法及电子设备 | |
EP2110742A1 (fr) | Dispositif portable et procédé de démarrage externe d'une installation informatique | |
WO2012111018A1 (fr) | Dispositif usb inviolable sécurisé et son procédé d'exploitation mis en œuvre par ordinateur | |
EP2077515B1 (fr) | Dispositif, systèmes et procédé de démarrage sécurisé d'une installation informatique | |
US20220393869A1 (en) | Recovery keys | |
WO2007132122A1 (fr) | Procede et dispositif de configuration securisee d'un terminal au moyen d'un dispositif de stockage de donnees de demarrage | |
US8607343B2 (en) | Ticket-based personalization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20141003 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: BROSSARD, JONATHAN Inventor name: MASSAVIOL, NICOLAS |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20170807 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20200904 |