Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods, devices and data structures for trusted data

A data structure and credible technology, applied in electrical digital data processing, instruments, calculations, etc., can solve practical difficulties, prevent continuous access to sealed data, etc.

Inactive Publication Date: 2009-10-07
HEWLETT PACKARD DEV CO LP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the "sealed" example above, this means that changes to the software - which may be entirely desirable, for example, to improve functionality or remove bugs and weaknesses - have the disadvantage of preventing continued access to sealed data
And this is just an example question, but - there is a general difficulty in having the same trust in new or replacement software as in the original software, which has concomitant practices in maintaining functions based on that trust difficulty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods, devices and data structures for trusted data
  • Methods, devices and data structures for trusted data
  • Methods, devices and data structures for trusted data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0129] We now describe the upgrade of PCRs purely as an example where only a single declaration of a linked list is recorded in the TPM. We assume that we are asked to prove that the integrity measure sequence A0 B0 is trust-equivalent to the integrity measure sequence A0 B1. This example uses a modified data structure that omits the declaration fields mentioned above. One implementation is:

[0130] 1. TPM_upgrade_extend (R~, A0) => [Uextend, R~, A0~]

[0131] 2. TPM_upgrade_forkRoot (Uextend, R~, A0~) => [Ufork, R~, A0~, A0~]

[0132] 3. TPM_upgrade_link (B0, B1) => [Ulinked, B0, B1]

[0133] 4.TPM_upgrade_forkLink([Ufork, R~, A0~, A0~], [Ulinked, B0, B1], [0]) => [Ufork, R~, B0~, B1~]

[0134] 5. TPM_upgrade_forkPCR ([Ufork, R~, B0~, B1~], P) => [uPCR, P, B0~, B1~]

[0135] The structure [uPCR, P, B0~, B1~] can then be used with TPM_upgrade_forkHash to create a trust-equivalent composite PCR digest value. These values ​​are then used in TPM_upgrade_seal to upgrade the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data structure has within it the following elements: an identification of a data structure type; and a proof that two or more instances of the data structure type are as trustworthy as each other. Methods and devices using such data structures are described.

Description

[0001] This application is a divisional application of the application with the application number 200680009269.X, the application date is March 22, 2006, and the invention title is "Method, Device and Data Structure for Trusted Data". technical field [0002] The present invention relates to trusted data in the sense that at least one trusted entity is prepared to vouch for the data. It relates in particular to data including software, such as data structures or executable instructions, and in an embodiment to the upgrading or replacement of software on a computing device. Background technique [0003] An important consideration for interactions between computing entities is trust—whether the foreign computing entity acts in a reliable and predictable manner, or will (or has been) compromised. Trusted systems comprising components that are at least logically invulnerable have been developed by companies forming the Trusted Computing Group (TCG) - this group develops specifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/57
CPCG06F21/57
Inventor G·J·普鲁德勒D·普拉奎恩W·伯顿D·库尔曼
Owner HEWLETT PACKARD DEV CO LP