摘要 |
<p>Methods for authenticating hardware devices (130) incorporating digital certificates include a trusted certificate authority (230) assigning hardware data (240) to a hardware device (130). A hash algorithm applied to the hardware data, which generally comprises information identifying or associated with the hardware device (130), generates a digest (242) that is encrypted (244) by the private key of the trusted certificate authority. The encrypted digest and hardware data are stored (248) in a hardware component of the hardware device (130) and are accessed (258) by an authenticating device (110) using the public key of the trusted certificate authority (230) to decipher and create a decrypted digest (262) of the encrypted digest. The decrypted digest is then compared (266) to a comparison digest that is created (264) by applying the hash algorithm to the stored hardware data. The hardware device (130) is finally authenticated when the decrypted digest and the comparison digest are the same (268).</p> |