×

Method and system for authenticating and utilizing secure resources in a computer system

  • US 6,138,239 A
  • Filed: 11/13/1998
  • Issued: 10/24/2000
  • Est. Priority Date: 11/13/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for executing secure transactions on a computer system, the method comprising the steps of:

  • (a) providing a basic input output system (BIOS) on the computer system, the BIOS including first means for indicating a first trust relationship with the BIOS;

    (b) providing a secure peripheral coupled with the computer system, the secure peripheral including second means for indicating a second trust relationship with the secure peripheral;

    (c) providing a master security co-processor coupled with the secure peripheral and the memory, the master security co-processor for processing sensitive data on the computer system and including third means for indicating a third trust relationship with the master security co-processor; and

    (d) utilizing the BIOS or master security co-processor to verify at least one of the first trust relationship, the second trust relationship, or the third trust relationship using the first means for indicating the first trust relationship, the second means for indicating the second trust relationship, or the third means for indicating the third trust relationship.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×