System and method for data processing system planar authentication
First Claim
1. A method for authenticating a software program previously installed in a direct access storage device within a data processing system, said method comprising:
- providing a hardware inventory device within said data processing system;
storing in a non-erasable memory located within said hardware inventory device an unique identifier code (UIC) that uniquely identifies said data processing system;
storing in said non-erasable memory of said hardware inventory device an encrypted hash, wherein said encrypted hash is generated by combining said UIC and a basis input/output system (BIOS) hash; and
in response to a loading of a software program previously installed within a direct access storage device of said data processing system;
obtaining said encrypted hash from said non-erasable memory of said hardware inventory device;
decrypting said encrypted hash; and
generating a new hash by using said UIC and a BIOS from said data processing system;
comparing said decrypted hash with said new hash; and
allowing said software program loading to continue when said decrypted hash matches said new hash.
3 Assignments
0 Petitions
Accused Products
Abstract
Initially, a hardware inventory device is provided within the data processing system. UIC that uniquely identifies the data processing system is stored in a non-erasable memory of the hardware inventory device. An encrypted hash generated by combining the UIC and a BIOS hash is stored in the non-erasable memory of the hardware inventory device. In response to a loading of a software program previously installed within a direct access storage device of the data processing system, the following steps are performed: i. the encrypted hash is obtained from the non-erasable memory of the hardware inventory device; ii. the encrypted hash is decrypted; iii. a new hash is generated by using the UIC and a BIOS from the data processing system, and the decrypted hash is compared with the new hash; and iv. the software program loading is allowed to continue when the decrypted hash matches the new hash.
-
Citations
8 Claims
-
1. A method for authenticating a software program previously installed in a direct access storage device within a data processing system, said method comprising:
-
providing a hardware inventory device within said data processing system; storing in a non-erasable memory located within said hardware inventory device an unique identifier code (UIC) that uniquely identifies said data processing system; storing in said non-erasable memory of said hardware inventory device an encrypted hash, wherein said encrypted hash is generated by combining said UIC and a basis input/output system (BIOS) hash; and in response to a loading of a software program previously installed within a direct access storage device of said data processing system; obtaining said encrypted hash from said non-erasable memory of said hardware inventory device; decrypting said encrypted hash; and generating a new hash by using said UIC and a BIOS from said data processing system; comparing said decrypted hash with said new hash; and allowing said software program loading to continue when said decrypted hash matches said new hash. - View Dependent Claims (2, 3, 4)
-
-
5. A computer readable medium having a computer program product for authenticating a software program previously installed in a direct access storage device within a data processing system, said computer readable medium comprising:
-
computer program code for storing in a non-erasable memory located within a hardware inventory device an unique identifier code (UIC) that uniquely identifies a data processing system; computer program code for storing in said non-erasable memory of said hardware inventory device an encrypted hash, wherein said encrypted hash is generated by combining said UIC and a basis input/output system (BIOS) hash; and in response to a loading of a software program previously installed within a direct access storage device of said data processing system; computer program code for obtaining said encrypted hash from said non-erasable memory of said hardware inventory device; computer program code for decrypting said encrypted hash; and computer program code for generating a new hash by using said UIC and a BIOS from said data processing system; computer program code for comparing said decrypted hash with said new hash; and computer program code for allowing said software program loading to continue when said decrypted hash matches said new hash. - View Dependent Claims (6, 7, 8)
-
Specification