US 12,074,983 B2
Trusted computing device and operating method thereof
Eun Young Jung, Seoul (KR)
Assigned to SAMSUNG ELECTRONICS CO., LTD., Suwon-si (KR)
Filed by SAMSUNG ELECTRONICS CO., LTD., Suwon-si (KR)
Filed on Jun. 22, 2022, as Appl. No. 17/846,349.
Claims priority of application No. 10-2021-0153229 (KR), filed on Nov. 9, 2021; and application No. 10-2022-0004434 (KR), filed on Jan. 12, 2022.
Prior Publication US 2023/0144135 A1, May 11, 2023
Int. Cl. H04L 9/40 (2022.01); G06F 11/10 (2006.01); G06F 21/64 (2013.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 12/46 (2006.01); H04L 12/66 (2006.01)
CPC H04L 9/3242 (2013.01) [G06F 11/1004 (2013.01); G06F 21/64 (2013.01); H04L 9/0866 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A trusted computing device, comprising:
a device driven by firmware; and
a master controller, which generates an authentication value from the firmware and checks integrity for the authentication value at a first period,
wherein the master controller includes:
an authentication value generator, which generates the authentication value;
an authentication value repository, which stores the authentication value;
a security core, which blocks access to the authentication value stored in the authentication value repository from another core of the master controller or from a source outside the master controller to block modulation for the authentication values; and
an integrity checker, which checks integrity for the authentication value stored in the authentication value repository.