Binding data to a computing platform through use of a cryptographic module

作者: Kevin G. Depew , Jason Spottswood , Ramez N. Badaoui-Najjar , E. David Neufeld

DOI:

关键词: Computer engineeringComputing systemsOperating environmentComputer scienceENCODECryptographyInitializationState (computer science)

摘要: Using a cryptographic co-processor (220) in computing system (202) to encode data (351 - 353) using parameters (361 363) determined during initialization, or operation, from machine specific values (301 323) states bind optionally 303), (311 313), operating environment (321 state.

参考文章(20)
Boris Balacheff, Bruno Edgard Van Wilder, Graeme John Proudler, Liqun Chen, David Chan, Dipankar Gupta, Siani Lynne Pearson, Trusted computing platform using a trusted device assembly ,(2000)
Randall Scott Springfield, James Patrick Hoff, Steven Dale Goodman, David Rivera, David Carroll Challener, Secure single sign-on to operating system via power-on password ,(2004)
James Hoff, James Ward, Scott Elliott, Christopher Long, Method and system for binding a device to a planar ,(2001)
Graeme J. Proudler, Liqun Chen, Manuel Novoa, Wael M. Ibrahim, Methods and systems for utilizing cryptographic functions of a cryptographic co-processor ,(2006)
Randall Scott Springfield, Eric Richard Kern, Steven Dale Goodman, Daryl Carvis Cromer, Joseph Wayne Freeman, Method and system for detecting a tamper event in a trusted computing environment ,(2001)
Howard J. Locker, Daryl C. Cromer, Randall S. Springfield, Autonomic binding of subsystems to system to prevent theft ,(2003)