发明名称 JTAG fuse vulnerability determination and protection using a trusted execution environment
摘要 A method of configuring a trusted security zone into a portable electronic device. The method comprises executing instructions on a processor of the portable electronic device that determine the state of a JTAG (JTAG) port of the portable electronic device, if the JTAG port is determined to be enabled, executing instructions on the processor preventing configuration of the trusted security zone into the portable electronic device, and if the JTAG port is determined to be disabled, configuring the trusted security zone into the portable electronic device, whereby a vulnerability to hacking the trusted security zone via an enabled JTAG port is reduced.
申请公布号 US9021585(B1) 申请公布日期 2015.04.28
申请号 US201313844325 申请日期 2013.03.15
申请人 Sprint Communications Company L.P. 发明人 Paczkowski Lyle W.;Parsel William M.;Persson Carl J.;Schlesener Matthew C.
分类号 G06F21/00;G06F21/57 主分类号 G06F21/00
代理机构 代理人
主权项 1. A method of configuring a trusted security zone into a portable electronic device, comprising: executing instructions on a processor of the portable electronic device that determine the state of a Joint Test Action Group (JTAG) port of the portable electronic device; responsive to a determination that the JTAG port is enabled, executing instructions on the processor preventing configuration of the trusted security zone into the portable electronic device; responsive to a determination that the JTAG port is disabled, configuring the trusted security zone into the portable electronic device, wherein the trusted security zone provides hardware assisted trust, wherein configuring the trusted security zone comprises installing the trusted security zone in a secure portion of a memory in the portable electronic device; and after the trusted security zone is configured into the portable electronic device, executing instructions on the processor creating a JTAG port inspected certificate and storing the JTAG port inspected certificate into a trusted memory area of the trusted security zone, wherein executing instructions on the processor preventing configuration of the trusted security zone into the portable electronic device responsive to the determination that the JTAG port is enabled reduces a vulnerability to hacking the trusted security zone via the enabled JTAG port.
地址 Overland Park KS US