摘要 |
The present secure hardware device authentication method further protects the data within the secure hardware device by authenticating the trusted software object prior to allowing the trusted software object to access protected data within the secure hardware device. Authenticating the trusted operating system prior to granting access to the secure hardware device prevents an unauthorized individual from tampering with the trusted software object after the computer system is initialized. The method of authentication may include authentication of the certificate appended to the trusted software object or may be a request for a signed message from the trusted software object. If the trusted software object is not authenticated, access to the secure hardware device is denied.
|