Systems and methods for binding a hardware component and a platform
First Claim
1. A hardware-based method for binding a hardware component and a platform, comprising method operations of:
- establishing a cryptographic binding between the hardware component and the platform, the cryptographic binding being registration of cryptographic keys between the hardware component and the platform; and
performing an identity exchange between the hardware component and the platform using the cryptographic keys as inputs to cryptographic operations, the identity exchange enabling a challenger to verify the identity of a responder.
1 Assignment
0 Petitions
Accused Products
Abstract
A hardware-based method for binding a hardware component and a platform is provided. In this hardware-based method, a cryptographic binding is established between the hardware component and the platform. The cryptographic binding is the registration of cryptographic keys between the hardware component and the platform. Subsequently, an identity exchange is performed between the hardware component and the platform using the cryptographic keys as inputs to cryptographic operations, where the identity exchange enables a challenger to verify the identity of a responder. A hardware component to be bound with a platform, a platform identity module, and a system for binding a hardware component and a platform also are described.
77 Citations
63 Claims
-
1. A hardware-based method for binding a hardware component and a platform, comprising method operations of:
-
establishing a cryptographic binding between the hardware component and the platform, the cryptographic binding being registration of cryptographic keys between the hardware component and the platform; and
performing an identity exchange between the hardware component and the platform using the cryptographic keys as inputs to cryptographic operations, the identity exchange enabling a challenger to verify the identity of a responder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A platform identity module (PIM) for binding a hardware component and a platform, comprising:
-
logic for establishing a cryptographic binding between the hardware component and the PIM, the cryptographic binding being registration of cryptographic keys between the hardware component and the PIM; and
logic for performing an identity exchange between the hardware component and the PIM using the cryptographic keys as inputs to cryptographic operations, the identity exchange enabling a challenger to verify the identity of a responder. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A hardware component to be bound with a platform, comprising:
-
logic for establishing a cryptographic binding between the platform and the hardware component, the cryptographic binding being registration of cryptographic keys between the platform and the hardware component; and
logic for performing an identity exchange between the platform and the hardware component using the cryptographic keys as inputs to cryptographic operations, the identity exchange enabling a challenger to verify the identity of a responder. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A system for binding a hardware component and a platform, comprising:
-
a platform including, logic for establishing a cryptographic binding between the hardware component and the platform, the cryptographic binding being registration of cryptographic keys between the hardware component and the platform, and logic for performing an identity exchange between the hardware component and the platform using the cryptographic keys as inputs to cryptographic operations, the identity exchange enabling a challenger to verify the identity of a responder; and
the hardware component in communication with the platform. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63)
-
Specification