Methods, devices and data structures for trusted data
A data structure and credible technology, applied in electrical digital data processing, instruments, calculations, etc., can solve practical difficulties, prevent continuous access to sealed data, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0129] We now describe the upgrade of PCRs purely as an example where only a single declaration of a linked list is recorded in the TPM. We assume that we are asked to prove that the integrity measure sequence A0 B0 is trust-equivalent to the integrity measure sequence A0 B1. This example uses a modified data structure that omits the declaration fields mentioned above. One implementation is:
[0130] 1. TPM_upgrade_extend (R~, A0) => [Uextend, R~, A0~]
[0131] 2. TPM_upgrade_forkRoot (Uextend, R~, A0~) => [Ufork, R~, A0~, A0~]
[0132] 3. TPM_upgrade_link (B0, B1) => [Ulinked, B0, B1]
[0133] 4.TPM_upgrade_forkLink([Ufork, R~, A0~, A0~], [Ulinked, B0, B1], [0]) => [Ufork, R~, B0~, B1~]
[0134] 5. TPM_upgrade_forkPCR ([Ufork, R~, B0~, B1~], P) => [uPCR, P, B0~, B1~]
[0135] The structure [uPCR, P, B0~, B1~] can then be used with TPM_upgrade_forkHash to create a trust-equivalent composite PCR digest value. These values are then used in TPM_upgrade_seal to upgrade the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 