Ricoh Aficio SP C820DNT1 Design Guide - Page 20

Verification of Firmware/Program Validity

Page 20 highlights

Print Controller Design Guide for Information Security 1-4-2 Verification of Firmware/Program Validity Overview In order to continually ensure the validity of all controller core programs and application firmware installed on the MFP/LP at the time of product shipment, as well as those that are newly installed as updates through the process explained in section 1.4.1 above, the MFP/LP performs a validation process known as Trusted Boot every time the main system is booted up. Covering the range of software from boot programs to end-point functions and applications, the Trusted Boot validation process provides comprehensive, TPM-based security. The MFP/LP uses the unique digital signature assigned to each program/firmware in order to judge its validity. The public key used for this verification is stored in an overwrite-protected, non-volatile region of the TPM, which makes it extremely difficult for the key itself to be altered in any way, providing additional protection of the programs/firmware. Trusted Boot employs two methods to verify the validity of the programs/firmware mentioned above: RTM (Root Trust of Measurement) is used to validate the controller core programs, which include the MFP/LP operating system, BIOS, and boot loader. Using the TPM, this method is capable of detecting any alterations made to these programs. The same digital signature-based verification process explained in section 1.4.1 is used to validate the application firmware Trusted Boot is integrated with the protection of the user's encryption keys (see section 1.8 for details), ensuring that only valid programs are given access to these keys. Note: Produced by STMicroelectronics, TPM is a product of the ST19WP18 family, which has earned Common Criteria certification (EAL5+). Page 20 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 20 of 86
1-4-2 Verification of Firmware/Program Validity
Overview
°
In order to continually ensure the validity of all controller core programs and application firmware
installed on the MFP/LP at the time of product shipment, as well as those that are newly installed as
updates through the process explained in section 1.4.1 above, the MFP/LP performs a validation
process known as Trusted Boot every time the main system is booted up. Covering the range of
software from boot programs to end-point functions and applications, the Trusted Boot validation
process provides comprehensive, TPM-based security.
°
The MFP/LP uses the unique digital signature assigned to each program/firmware in order to judge its
validity. The public key used for this verification is stored in an overwrite-protected, non-volatile region
of the TPM, which makes it extremely difficult for the key itself to be altered in any way, providing
additional protection of the programs/firmware.
°
Trusted Boot employs two methods to verify the validity of the programs/firmware mentioned above:
±
RTM (Root Trust of Measurement) is used to validate the controller core programs, which include
the MFP/LP operating system, BIOS, and boot loader. Using the TPM, this method is capable of
detecting any alterations made to these programs.
±
The same digital signature-based verification process explained in section 1.4.1 is used to
validate the application firmware
°
Trusted Boot is integrated with the protection of the user’s encryption keys (see section 1.8 for details),
ensuring that only valid programs are given access to these keys.
Note:
Produced by STMicroelectronics, TPM is a product of the ST19WP18 family, which has earned
Common Criteria certification (EAL5+).