US 12,468,801 B2
Use of image signing in endpoint device operation management
Bradley K. Goodman, Nashua, NH (US); Joseph Caisse, Burlington, MA (US); and James Daniel Harms, Worthington, OH (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Jun. 27, 2023, as Appl. No. 18/341,971.
Prior Publication US 2025/0005133 A1, Jan. 2, 2025
Int. Cl. G06F 21/00 (2013.01); G06F 21/51 (2013.01)
CPC G06F 21/51 (2013.01) [G06F 2221/033 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing operation of an endpoint device, the method comprising:
during a startup of the endpoint device:
identifying a software image for execution during the startup;
identifying that the software image is trustworthy for execution at least during the startup using:
an attested image entry of a trust database, and
another entry of the trust database, the other entry comprising a key usable to verify the attested image entry;
establishing a security status of the endpoint device using a set of rules that:
require establishing trustworthiness of a first portion of the trust database, and
do not require establishing trustworthiness of a second portion of the trust database;
obtaining use of a secret managed by a security processor using the security status; and
performing an operation to contribute towards completion of the startup through the use of the secret.