US 11,941,159 B2
Configuration data deletion based on tamper status
Christopher Howard Stewart, Spring, TX (US); Jeffrey Kevin Jeansonne, Spring, TX (US); Richard Alden Bramley, Jr., Mansfield, MA (US); and Maugan Cedric Villatel, Bristol (GB)
Assigned to HEWLETT-PACKARD DEVELOMENT COMPANY, L.P., Spring, TX (US)
Filed by HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., Spring, TX (US)
Filed on Jun. 8, 2021, as Appl. No. 17/341,448.
Prior Publication US 2022/0391545 A1, Dec. 8, 2022
Int. Cl. G06F 3/06 (2006.01); G06F 21/31 (2013.01); G06F 21/57 (2013.01); G06F 21/60 (2013.01); G06F 21/78 (2013.01); G06F 21/86 (2013.01)
CPC G06F 21/78 (2013.01) [G06F 3/0622 (2013.01); G06F 3/0629 (2013.01); G06F 3/0683 (2013.01); G06F 21/31 (2013.01); G06F 21/602 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A non-transitory computer-readable storage medium storing thereon instructions that, when executed, cause a processor of a computing device to:
read, during start-up of the computing device, first configuration data from a first storage device of the computing device;
read second configuration data from a second storage device of the computing device, wherein the second storage device is not the same as the first storage device, and wherein the second configuration data is a previously made copy of the first configuration data stored on the second storage device;
determine that there is an inconsistency between the first configuration data and the second configuration data;
check a tamper status of the computing device;
clear a secure storage location of the computing device, the secure storage location storing data to access protected data, when the tamper status of the computing device that is checked indicates tampering; and
replace the first configuration data on the first storage device of the computing device based on second data and continue the start-up of the computing device, when the tamper status of the computing device that is checked indicates no tampering.