The document describes the secure boot and secure storage patterns. Secure boot ensures the integrity of loaded software by creating a chain of trust where each boot stage verifies the integrity of the next stage before transferring control. Secure storage protects the confidentiality and integrity of stored data by allowing only software that has passed an integrity check to access encrypted data stored in hardware-protected locations. Both patterns are fundamental for trusted computing systems and provide defenses for boot time and stored data integrity.