发明名称 Authenticating suspect data using key tables
摘要 A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
申请公布号 GB2455004(B) 申请公布日期 2011.02.23
申请号 GB20090003328 申请日期 2007.12.06
申请人 LENOVO 发明人 DAVID CARROLL CHALLENER;JOHN H NICHOLSON;JOSEPH MICHAEL PENNISI;ROD DAVID WALTERMANN
分类号 G06F21/22 主分类号 G06F21/22
代理机构 代理人
主权项
地址