Trusted sequence for computing devices via hashes
Abstract:
An example computer system includes a memory having a computer program, a set of data containing a cryptographic first hash protected by a code, and a set of trusted security guidelines for operating an electronic device; a trusted platform module device to store a second hash associated with the computer program; a trusted application computing agent to establish that a hardware initialization sequence of the electronic device is trusted upon matching the first hash with the second hash; and a controller to operate the computer program on the electronic device according to the set of trusted security guidelines.
Public/Granted literature
Information query
Patent Agency Ranking
0/0