Methods and systems for associating an embedded security chip with a computer

作者: Lan Wang , Manuel Novoa , Valiuddin Y. Ali

DOI:

关键词: Function (engineering)Embedded systemEmbedded securityChipComputer-on-moduleInitializationComputer scienceCryptography

摘要: In at least some embodiments, a method comprises initializing an embedded security chip (114) for use with computer (100) and performing binding operation between the (100). The further comprises, during each subsequent boot of (100), validating before performs cryptographic function.

参考文章(20)
James Hoff, James Ward, Scott Elliott, Andy Trotter, David Rivera, Christopher Long, Method and system for key usage control in an embedded security system ,(2001)
Hernando Ovies, Randall Springfield, David Challener, James Hoff, James Ward, Steven Goodman, Tamper detection mechanism for a personal computer and a method of use thereof ,(2002)
Nia Kelley, Thomas Dewkett, Helmut Weber, Siegfried Sutter, Steven Bade, Method, apparatus, and product for providing a backup hardware trusted platform module in a hypervisor environment ,(2004)
Stefan Berger, Reiner Sailer, Kenneth Alan Goldman, Ronald Perez, Leendert Peter Van Doorn, Steven A. Bade, Dynamic creation and hierarchical organization of trusted platform modules ,(2008)
James Hoff, James Ward, Scott Elliott, Christopher Long, Method and system for binding a device to a planar ,(2001)
Stefan Thom, Paul England, Kenneth D. Ray, Jamie Hunter, Russell Humphries, Jonathan Schwartz, James Anthony Schwartz, Systems and methods for updating a secure boot process on a computer with a hardware security module ,(2005)