Sign In to Follow Application
View All Documents & Correspondence

Method And System For Protecting Computing Devices From Malwares

Abstract: This disclosure relates method and system for protecting a computing device from a malware. In one embodiment, the method may include determining a digital trust certificate of a set of computing instructions to be executed by the computing device. The set of computing instructions may form a part of a boot process of the computing device, and may be a firmware, a boot loader, a kernel, a system driver, a start-up file, or an antimalware. The method may further include establishing a chain of trust by validating the digital trust certificate with the computing device. The digital trust certificate may be pre-registered with a local database, accessible by the computing device, by communicating with a centralized certificate authority and policy server. Upon a positive establishment of the chain of trust, the method may further include allowing an execution of the set of computing instructions by the computing device. FIGURE 3

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
23 May 2018
Publication Number
48/2019
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
bangalore@knspartners.com
Parent Application
Patent Number
Legal Status
Grant Date
2024-02-13
Renewal Date

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore

Inventors

1. RAJEEV KUMAR UJJWAL
C3PO2, Westend Heights, DLF, Akshaya Nagar, Begur, Bangalore 560068

Specification

Claims:WE CLAIM
1. A method of protecting a computing device from a malware, the method comprising:
determining a digital trust certificate of a set of computing instructions to be executed by the computing device, wherein the set of computing instructions forms a part of a boot process of the computing device, and wherein the set of computing instructions forms a firmware and at least one of a boot loader, a kernel, a system driver, a start-up file, or an antimalware;
establishing a chain of trust by validating the digital trust certificate with the computing device, wherein the digital trust certificate is pre-registered with a local database accessible by the computing device, and wherein the pre-registration is performed by a centralized certificate authority and policy server in a past instance of a successful boot; and
upon a positive establishment of the chain of trust, allowing an execution of the set of computing instructions by the computing device.

2. The method of claim 1, further comprising, upon a negative establishment of the chain of trust, effecting a remedial action by isolating the set of computing instructions and by allowing an execution of a previous set of computing instructions by the computing device.

3. The method of claim 1, wherein validating the digital trust certificate comprises validating a trust key of the set of computing instructions with a platform key of the computing device, and wherein the trust key is pre-registered with the local database.

4. The method of claim 3, wherein the trust key of the set of computing instructions is validated with the platform key of the computing device using a hash of at least one of a public half or a private half of the digitally signed key.

5. The method of claim 1, wherein the local database is accessible by the computing device during the boot process and prior to a successful boot.

6. The method of claim 1, wherein validating the digital trust certificate comprises validating the digital trust certificate by a boot guard, a BIOS guard, and an operating system (OS) guard.

7. The method of claim 1, wherein the malware comprises at least one of a rootkit infection, a bootkit infection, a virus, a worm, a Trojan horse, a ransomware, a remote access Trojan, a spyware, or an adware.

8. The method of claim 1, wherein the chain of trust comprises an end-to-end chain of trust comprising a hardware based root of trust, and wherein establishing the chain of trust comprises validating the hardware based root of trust by a boot guard, a BIOS guard, and an operating system (OS) guard.

9. The method of claim 8, wherein validating the hardware based root of trust comprises validating the platform key (PK) that’s implemented into a firmware or a hardware by a manufacturer.

10. A system, comprising:
a computing device comprising at least one processor and a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations for protecting the computing device from a malware, the operations comprising:
determining a digital trust certificate of a set of computing instructions to be executed by the computing device, wherein the set of computing instructions forms a part of a boot process of the computing device, and wherein the set of computing instructions forms a firmware and at least one of a boot loader, a kernel, a system driver, a start-up file, or an antimalware;
establishing a chain of trust by validating the digital trust certificate with the computing device, wherein the digital trust certificate is pre-registered with a local database accessible by the computing device, and wherein the pre-registration is performed by a centralized certificate authority and policy server in a past instance of a successful boot; and
upon a positive establishment of the chain of trust, allowing an execution of the set of computing instructions by the computing device.

11. The system of claim 10, wherein, upon a negative establishment of the chain of trust, the operations further comprise effecting a remedial action by isolating the set of computing instructions and by allowing an execution of a previous set of computing instructions by the computing device.

12. The system of claim 10, wherein validating the digital trust certificate comprises validating a trust key of the set of computing instructions with a platform key of the computing device, and wherein the trust key is pre-registered with the local database.

13. The system of claim 12, wherein the trust key of the set of computing instructions is validated with the platform key of the computing device using a hash of at least one of a public half or a private half of the digitally signed key.

14. The system of claim 10, wherein the local database is accessible by the computing device during the boot process and prior to a successful boot.

15. The system of claim 10, wherein validating the digital trust certificate comprises validating the digital trust certificate by a boot guard, a BIOS guard, and an operating system (OS) guard.

16. The system of claim 10, wherein the chain of trust comprises an end-to-end chain of trust comprising a hardware based root of trust, and wherein establishing the chain of trust comprises validating the hardware based root of trust by a boot guard, a BIOS guard, and an operating system (OS) guard.

17. The system of claim 16, wherein validating the hardware based root of trust comprises validating the platform key (PK) that’s implemented into a firmware or a hardware by a manufacturer.

Dated this 23rd day of May, 2018

Swetha SN
Of K&S Partners
Agent for the Applicant
IN/PA-2123
, Description:TECHNICAL FIELD
This disclosure relates generally to computer security, and more particularly to method and system for protecting a computing device from a malware.

Documents

Application Documents

# Name Date
1 201841019403-STATEMENT OF UNDERTAKING (FORM 3) [23-05-2018(online)].pdf 2018-05-23
2 201841019403-REQUEST FOR EXAMINATION (FORM-18) [23-05-2018(online)].pdf 2018-05-23
3 201841019403-POWER OF AUTHORITY [23-05-2018(online)].pdf 2018-05-23
4 201841019403-FORM 18 [23-05-2018(online)].pdf 2018-05-23
5 201841019403-FORM 1 [23-05-2018(online)].pdf 2018-05-23
6 201841019403-DRAWINGS [23-05-2018(online)].pdf 2018-05-23
7 201841019403-DECLARATION OF INVENTORSHIP (FORM 5) [23-05-2018(online)].pdf 2018-05-23
8 201841019403-COMPLETE SPECIFICATION [23-05-2018(online)].pdf 2018-05-23
9 201841019403-REQUEST FOR CERTIFIED COPY [25-05-2018(online)].pdf 2018-05-25
10 201841019403-Proof of Right (MANDATORY) [15-09-2018(online)].pdf 2018-09-15
11 Correspondence by Agent_Form1_19-09-2018.pdf 2018-09-19
12 201841019403-PETITION UNDER RULE 137 [22-02-2021(online)].pdf 2021-02-22
13 201841019403-OTHERS [22-02-2021(online)].pdf 2021-02-22
14 201841019403-FORM 3 [22-02-2021(online)].pdf 2021-02-22
15 201841019403-FER_SER_REPLY [22-02-2021(online)].pdf 2021-02-22
16 201841019403-DRAWING [22-02-2021(online)].pdf 2021-02-22
17 201841019403-COMPLETE SPECIFICATION [22-02-2021(online)].pdf 2021-02-22
18 201841019403-CLAIMS [22-02-2021(online)].pdf 2021-02-22
19 201841019403-FER.pdf 2021-10-17
20 201841019403-PatentCertificate13-02-2024.pdf 2024-02-13
21 201841019403-IntimationOfGrant13-02-2024.pdf 2024-02-13
22 201841019403-PROOF OF ALTERATION [02-05-2024(online)].pdf 2024-05-02

Search Strategy

1 Search201841019403E_30-09-2020.pdf

ERegister / Renewals

3rd: 02 May 2024

From 23/05/2020 - To 23/05/2021

4th: 02 May 2024

From 23/05/2021 - To 23/05/2022

5th: 02 May 2024

From 23/05/2022 - To 23/05/2023

6th: 02 May 2024

From 23/05/2023 - To 23/05/2024

7th: 02 May 2024

From 23/05/2024 - To 23/05/2025

8th: 21 May 2025

From 23/05/2025 - To 23/05/2026