System and method for data processing system planar authentication
First Claim
1. A method for authenticating a data processing system having a hardware inventory device that is uniquely associated with the data processing system, and method comprising:
- storing an identifier code that uniquely identifies the data processing system in non-erasable memory within the hardware inventory device;
storing an encrypted hash of the identifier code in non-erasable memory within the hardware inventory device; and
responsive to initiating installation of computer software on said data processing system;
generating a hash of the identifier code;
decrypting the encrypted hash of the identifier code; and
comparing the decrypted identifier code hash with the generated identifier code hash to authenticate the system.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a system planar specific pre-load authentication that enables a supplier of system hardware and software components to detect assembly of unauthorized systems. The method includes authenticating a data processing system having a hardware inventory device that is uniquely associated with the data processing system. First, an identifier code that uniquely identifies the data processing system and an encrypted hash of the identifier code are stored in non-erasable memory within a hardware inventory device prior to the device being mounted on a system board. After mounting the hardware inventory device on the system board, software preload is authenticated by generating a hash of the identifier code, decrypting the encrypted hash of the identifier code, and comparing the decrypted identifier code hash with the generated identifier code hash to authenticate the system. The entities providing the hardware and/or software components, maintains a record of the system specific identifier codes enabling hardware inventory control tracking by comparing the number of hardware inventory devices issued to a specified system manufacturer with the number of system boards ordered by the manufacturer.
-
Citations
7 Claims
-
1. A method for authenticating a data processing system having a hardware inventory device that is uniquely associated with the data processing system, and method comprising:
-
storing an identifier code that uniquely identifies the data processing system in non-erasable memory within the hardware inventory device;
storing an encrypted hash of the identifier code in non-erasable memory within the hardware inventory device; and
responsive to initiating installation of computer software on said data processing system;
generating a hash of the identifier code;
decrypting the encrypted hash of the identifier code; and
comparing the decrypted identifier code hash with the generated identifier code hash to authenticate the system. - View Dependent Claims (2, 3, 4)
-
-
5. A system for authenticating a data processing system having a hardware inventory device that is uniquely associated with the data processing system, and system comprising:
-
IC manufacturing processing means for storing an identifier code that uniquely identifies the data processing system in non-erasable memory within the hardware inventory device;
IC manufacturing processing means for storing an encrypted hash of the identifier code in non-erasable memory within the hardware inventory device; and
processing means for responsive to initiating installation of computer software on said data processing system for;
generating a hash of the identifier code;
decrypting the encrypted hash of the identifier code; and
comparing the decrypted identifier code hash with the generated identifier code hash to authenticate the system. - View Dependent Claims (6, 7)
-
Specification