Method and system for verifying binding of an initial trusted device to a secured processing system

作者: David Carroll Challener , Steven A. Bade

DOI:

关键词: System identificationInitializationCredentialEmbedded systemBinding processAbortNO bindingEngineering

摘要: A method and system for verifying binding of an initial trusted device to a secured processing binds or replacement when no information is available from another in the system. platform credential issued only valid verified, by sending proof provider, such as manufacturer. The secures against security breaches that can occur removed during process. generated upon installation includes identification so at each initialization, return device, ensure it installed proper abort operation if does not match.

参考文章(11)
Kim Ryal, Brant Candelore, Locking a hard drive to a host ,(2002)
James Hoff, James Ward, Scott Elliott, Christopher Long, Method and system for binding a device to a planar ,(2001)
David Chan, Siani Lynne Pearson, Computer platforms and their methods of operation ,(2000)
K. Puttegowda, P. Athanas, RSA encryption using extended modular arithmetic on the Quicksilver COSM adaptive computing machine field-programmable custom computing machines. pp. 305- 307 ,(2003) , 10.1109/FPGA.2003.1227282
Changwen Liu, H. Soliman, Local key exchange for mobile IPv6 local binding security association vehicular technology conference. ,vol. 5, pp. 2647- 2655 ,(2004) , 10.1109/VETECS.2004.1391401
J. Al-Muhtadi, R. Hill, R. Campbell, M.D. Mickunas, Context and location-aware encryption for pervasive computing environments pervasive computing and communications. pp. 283- 289 ,(2006) , 10.1109/PERCOMW.2006.33
S. Sokolov, R. Karri, Allocation and binding during fault-secure microarchitecture synthesis international conference on computer design. pp. 327- 330 ,(1994) , 10.1109/ICCD.1994.331917
Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee, IAuth: An authentication system for Internet applications computer software and applications conference. pp. 654- 659 ,(1997) , 10.1109/CMPSAC.1997.625088
David Challener, James Ward, Daryl Cromer, James Hoff, Controlling access to data stored on a storage device of a trusted computing platform system ,(2002)