摘要 |
<p><P>PROBLEM TO BE SOLVED: To provide a method for ensuring the security of a particular configuration of hardware and software for an information processing system that is assembled using a "build-to-order" system. <P>SOLUTION: The security and integrity of data on an information processing system is ensured from the point of manufacturer to the final destination at a customer's facility. The information processing system is then manufactured with an operating system and a predetermined set of software being installed thereon. A manifest file is constructed comprising a predetermined set of data files and configuration information. The manifest file is signed with at least one electronic key. When the information processing system performs its initial boot, a second electronic key is used to extract information from the manifest file and the existing data files and configuration information are compared with the information contained in the manifest file. If any of the information has been altered, the initial boot is designated as "invalid" and the user is notified of the possibility for a breach of security. <P>COPYRIGHT: (C)2006,JPO&NCIPI</p> |