System for binding secrets to a computer system having tolerance for hardware changes
First Claim
Patent Images
1. A method of generating a strong hardware identification (SHWID) for a first computer system having a first hardware configuration, wherein the method comprises:
- identifying each component class within the first hardware configuration, wherein the number of component classes is equal to n;
determining a class product, cp, for each component class;
determining a partial secret, Pp, for each component class; and
adding the class product, cp, and the partial secret, Pp, for each component class to form n strong class IDs, wherein the n strong class IDs in combination form the strong hardware identification (SHWID) of the first computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for binding a secret to a computer system are disclosed. Systems and methods for generating a strong hardware identification (SHWID) for a given computer system are also disclosed. The strong hardware identification (SHWID) is coupled to a bound secret. The strong hardware identification (SHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.
-
Citations
41 Claims
-
1. A method of generating a strong hardware identification (SHWID) for a first computer system having a first hardware configuration, wherein the method comprises:
-
identifying each component class within the first hardware configuration, wherein the number of component classes is equal to n;
determining a class product, cp, for each component class;
determining a partial secret, Pp, for each component class; and
adding the class product, cp, and the partial secret, Pp, for each component class to form n strong class IDs, wherein the n strong class IDs in combination form the strong hardware identification (SHWID) of the first computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer readable medium having stored thereon computer-executable instructions for performing a method of generating a strong hardware identification (SHWID) for a first computer system having a first hardware configuration, wherein the method comprises:
-
identifying each component class within the first hardware configuration, wherein the number of component classes is equal to n;
determining a class product, cp, for each component class;
determining a partial secret, Pp, for each component class; and
adding the class product, cp, and the partial secret, Pp, for each component class to form n strong class IDs, wherein the n strong class IDs in combination form the strong hardware identification (SHWID) of the first computer system. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computing system containing at least one application module usable on the computing system, wherein the at least one application module comprises application code for performing a method of generating a strong hardware identification (SHWID) for a first computer system having a first hardware configuration, wherein the method comprises:
-
identifying each component class within the first hardware configuration, wherein the number of component classes is equal to n;
determining a class product, cp, for each component class;
determining a partial secret, Pp, for each component class; and
adding the class product, cp, and the partial secret, Pp, for each component class to form n strong class IDs, wherein the n strong class IDs in combination form the strong hardware identification (SHWID) of the first computer system. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification