SYSTEM AND METHOD OF ENABLING A FUNCTION WITHIN A MODULE CONFIGURED TO BE USED WITHIN AN INFORMATION HANDLING SYSTEM
First Claim
Patent Images
1. A method of enabling functions of a security card comprising:
- detecting whether to install a custom install routine within a module configured to enable access to a hash function;
accessing a lock bit configured to lock access to the hash function; and
detecting whether to set the lock bit to lock access to the hash function.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method of enabling a function within a module configured to be used with an information handling system is disclosed. In one form, the method of enabling functions includes detecting whether to install a custom install routine within a module configured to enable access to a hash function, and accessing a lock bit configured to lock access to the hash function. The method can further include detecting whether to set the lock bit to lock access to the hash function.
10 Citations
20 Claims
-
1. A method of enabling functions of a security card comprising:
-
detecting whether to install a custom install routine within a module configured to enable access to a hash function; accessing a lock bit configured to lock access to the hash function; and detecting whether to set the lock bit to lock access to the hash function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security card comprising:
-
a module configured to execute a hash function installation routine to install a hash function; a memory coupled to the module and configured to store a hash function loaded during the installation process; and a hash function lock bit configured to be set in association with completing the installation of a hash function routine. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An information handling system comprising:
-
a security card configurable to access a hash function installed during execution of a hash function installation routine; a trusted platform module configured to execute the hash function installation routine; and a hash function lock bit configured to be set upon installation of the hash function using the hash function installation routine. - View Dependent Claims (17, 18, 19, 20)
-
Specification