System and method of enabling a function within a module configured to be used within an information handling system
First Claim
Patent Images
1. A method of enabling functions of a security card, the method comprising:
- detecting whether to execute a custom install routine within a module configured to enable access to a hash function;
accessing a lock bit configured to lock access to the hash function; and
detecting whether to set the lock bit to lock access to the hash function based on whether the custom install routine has been completed, wherein setting the lock bit is irreversible.
13 Assignments
0 Petitions
Accused Products
Abstract
A system and method of enabling a function within a module configured to be used with an information handling system is disclosed. In one form, the method of enabling functions includes detecting whether to install a custom install routine within a module configured to enable access to a hash function, and accessing a lock bit configured to lock access to the hash function. The method can further include detecting whether to set the lock bit to lock access to the hash function.
6 Citations
20 Claims
-
1. A method of enabling functions of a security card, the method comprising:
-
detecting whether to execute a custom install routine within a module configured to enable access to a hash function; accessing a lock bit configured to lock access to the hash function; and detecting whether to set the lock bit to lock access to the hash function based on whether the custom install routine has been completed, wherein setting the lock bit is irreversible. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security card comprising:
-
a module configured to execute a hash function installation routine to install a hash function; a memory coupled to the module and configured to store a hash function loaded during the installation process; and a hash function lock bit configured to be set in association with completing the installation of a hash function routine, wherein setting the hash function lock bit is irreversible. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An information handling system comprising:
-
a security card configurable to access a hash function installed during execution of a hash function installation routine; a trusted platform module configured to execute the hash function installation routine; and a hash function lock bit configured to be set in association with completing the installation of the hash function, wherein setting the hash function lock bit is irreversible. - View Dependent Claims (17, 18, 19, 20)
-
Specification