发明名称 Authenticating suspect data using key tables
摘要 A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
申请公布号 GB0723883(D0) 申请公布日期 2008.01.16
申请号 GB20070023883 申请日期 2007.12.06
申请人 LENOVO (SINGAPORE) PTE. LTD 发明人
分类号 主分类号
代理机构 代理人
主权项
地址