Method and system for secure external TPM password generation and use
First Claim
1. A trusted platform module (TPM) based computer system comprising one or more central processing units (CPUs) connected to one or more internal system busses, having random access memory (RAM), read-only memory, and at least one input/output adapter, which supports various I/O devices, a user interface adapter, a means for generating a secure access code at a remote device in communication with the system;
- conveying the secure access code to the TPM; and
receiving the secure access code at the TPM.wherein the TPM receives the secure access code as a parameter for various TPM commands.
17 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the present invention include a method and system for generating a secure access code at a remote device in communication with a computer system having a secure storage device; conveying the secure access code to the system secure storage device; receiving the secure access code at the system secure storage device with unique data characteristics associated with remote device; and, securely providing content to the remote device.
-
Citations
49 Claims
-
1. A trusted platform module (TPM) based computer system comprising one or more central processing units (CPUs) connected to one or more internal system busses, having random access memory (RAM), read-only memory, and at least one input/output adapter, which supports various I/O devices, a user interface adapter, a means for generating a secure access code at a remote device in communication with the system;
- conveying the secure access code to the TPM; and
receiving the secure access code at the TPM.wherein the TPM receives the secure access code as a parameter for various TPM commands. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
- conveying the secure access code to the TPM; and
-
26. A computer readable medium containing program instructions comprising:
-
generating a secure access code at a remote device in communication with a secure storage device; conveying the secure access code to the system secure storage device; and receiving the secure access code at the system secure storage device with unique data characteristics associated with a remote device. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
Specification