Claims
- 1. A method for facilitating secure operation of an integrated device, the method comprising:
passing a request for data through a data access controller; and selectively qualifying the request for data passing through the data access controller in accordance with a security state of the data access controller, wherein the security state of the data access controller comprises one state of multiple possible security states.
- 2. The method of claim 1, wherein the request for data comprises a request for boot code, and the security state comprises a secured state, and wherein the selectively qualifying includes:
replacing a standard boot code address associated with the request for boot code with a substitute boot code address held at the data access controller when in the secured state, wherein the substitute boot code address can be employed to access an encrypted version of boot code; and decrypting the encrypted version of boot code prior to return thereof to a functional master initiating the request for boot code.
- 3. The method of claim 2, wherein the decrypting includes employing a master key set held at the data access controller when in the secured state.
- 4. The method of claim 3, wherein an additional state of the multiple possible security states comprises a null state, and wherein the method further includes transitioning the security state of the data access controller to the null state responsive to tampering occuring with the integrated device or with a computing environment within which the integrated device resides, wherein the transitioning includes erasing the master key set from the data access controller, thereby inhibiting retrieval and decryption of the encrypted version of boot code.
- 5. The method of claim 4, wherein when the security state comprises the null state, the request for boot code is passed through the data access controller and accesses an open version of recovery code, wherein the open version of recovery code is different and functionally more limiting than the decrypted encrypted version of boot code obtained when the security state comprises the secured state.
- 6. The method of claim 1, wherein the request for data comprises a request for boot code, and wherein the selectively qualifying comprises providing an address of a version of boot code to be employed during initialization of the integrated device, the version of boot code to be employed during initialization being dependent on the security state of the data access controller.
- 7. A method of fabricating an integrated device to facilitate secure operation thereof, the method comprising:
providing, by a device manufacturer, an integrated device with a data access controller for selectively qualifying a request for data from a functional master within the integrated device, wherein the data access controller comprises multiple possible security states, and wherein the providing includes initially providing the data access controller in a null state of the multiple possible security states; and assembling, by a system manufacturer, the integrated device into a computing environment, wherein the assembling includes writing a master key set and a substitute boot address to persistent storage within the data access controller of the integrated device for use in the selectively qualifying, and initiating transition of the data access controller to a secured state, the secured state comprising another state of the multiple possible security states.
- 8. The method of claim 7, wherein when in the secured state, the data access controller selectively qualifies requests for data passing therethrough, and wherein when a request for data comprises a request for boot code, the selectively qualifying includes replacing a standard boot code address associated with the request for boot code with a substitute boot code address held by the data access controller, wherein the substitute boot code address can be employed to access an encrypted version of boot code, and decrypting the encrypted version of boot code prior of return thereof to a functional master of the integrated device initiating the request for boot code.
- 9. A system for facilitating secure operation of an integrated device, the system comprising:
a data access controller disposed within the integrated device, the data access controller receiving a request for data from a functional master of the integrated device; and wherein the data access controller comprises means for selectively qualifying the request for data received by the data access controller in accordance with a security state of the data access controller, wherein the security state of the data access controller comprises one state of multiple possible security states.
- 10. The system of claim 9, wherein the request for data comprises a request for boot code, and the security state comprises a secured state, and wherein the means for selectively qualifying includes:
means for replacing a standard boot code address associated with the request for boot code with a substitute boot code address held at the data access controller when in the secured state, wherein the substitute boot code address can be employed to access an encrypted version of boot code; and means for decrypting the encrypted version of boot code prior to return thereof to a functional master initiating the request for boot code.
- 11. The system of claim 10, wherein the means for decrypting includes means for employing a master key set held at the data access controller when in the secured state.
- 12. The system of claim 11, wherein an additional state of the multiple possible security states comprises a null state, and wherein the system further includes means for transitioning the security state of the data access controller to the null state responsive to tampering occuring with the integrated device or with a computing environment within which the integrated device resides, wherein the means for transitioning includes means for erasing the master key set from the data access controller, thereby inhibiting retrieval and decryption of the encrypted version of boot code.
- 13. The system of claim 12, wherein when the security state comprises the null state, the request for boot code is passed through the data access controller and accesses an open version of recovery code, wherein the open version of recovery code is different and functionally more limiting than the decrypted encrypted version of boot code obtained when the security state comprises the secured state.
- 14. The system of claim 9, wherein the request for data comprises a request for boot code, and wherein the means for selectively qualifying comprises means for providing an address of a version of boot code to be employed during initialization of the integrated device, the version of boot code to be employed during initialization being dependent on the security state of the data access controller.
- 15. At least one program storage device readable by a machine, tangibly embodying at least one program of instructions executable by the machine to perform a method for facilitating secure operation of an integrated device, the method comprising:
passing a request for data through a data access controller; and selectively qualifying the request for data passing through the data access controller in accordance with a security state of the data access controller, wherein the security state of the data access controller comprises one state of multiple possible security states.
- 16. The at least one program storage device of claim 15, wherein the request for data comprises a request for boot code, and the security state comprises a secured state, and wherein the selectively qualifying includes:
replacing a standard boot code address associated with the request for boot code with a substitute boot code address held at the data access controller when in the secured state, wherein the substitute boot code address can be employed to access an encrypted version of boot code; and decrypting the encrypted version of boot code prior to return thereof to a functional master initiating the request for boot code.
- 17. The at least one program storage device of claim 16, wherein the decrypting includes employing a master key set held at the data access controller when in the secured state.
- 18. The at least one program storage device of claim 17, wherein an additional state of the multiple possible security states comprises a null state, and wherein the method further includes transitioning the security state of the data access controller to the null state responsive to tampering occuring with the integrated device or with a computing environment within which the integrated device resides, wherein the transitioning includes erasing the master key set from the data access controller, thereby inhibiting retrieval and decryption of the encrypted version of boot code.
- 19. The at least one program storage device of claim 18, wherein when the security state comprises the null state, the request for boot code is passed through the data access controller and accesses an open version of recovery code, wherein the open version of recovery code is different and functionally more limiting than the decrypted encrypted version of boot code obtained when the security state comprises the secured state.
- 20. The at least one program storage device of claim 15, wherein the request for data comprises a request for boot code, and wherein the selectively qualifying comprises providing an address of a version of boot code to be employed during initialization of the integrated device, the version of boot code to be employed during initialization being dependent on the security state of the data access controller.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application contains subject matter which is related to the subject matter of the following applications, each of which is assigned to the same assignee as this application and filed on the same day as this application. Each of the below listed applications is hereby incorporated herein by reference in its entirety:
[0002] “CONTROL FUNCTION EMPLOYING A REQUESTING MASTER ID AND A DATA ADDRESS TO QUALIFY DATA ACCESS WITHIN AN INTEGRATED SYSTEM”, by Evans et al., U.S. Ser. No. ______ (Attorney Docket No. EN920010107US1), co-filed herewith;
[0003] “CONTROL FUNCTION IMPLEMENTING SELECTIVE TRANSPARENT DATA AUTHENTICATION WITHIN AN INTEGRATED SYSTEM”, by Foster et al., U.S. Ser. No. ______ (Attorney Docket No. EN920020003US1), co-filed herewith; and
[0004] “INITIALIZING, MAINTAINING, UPDATING AND RECOVERING SECURE OPERATION WITHIN AN INTEGRATED SYSTEM EMPLOYING A DATA ACCESS CONTROL FUNCTION”, by Foster et al., U.S. Ser. No. ______ (Attorney Docket No. EN920020004US1), co-filed herewith.