Determining user security level using trusted hardware device
A system and method for enabling multiple levels of access to data on a system includes receiving an identifying metric and processing the metric by salting, hashing, encrypting, or a combination thereof the metric to obtain a table lookup value. The table lookup value is used to index a PW hash tab...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
23.06.2005
|
Edition | 7 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A system and method for enabling multiple levels of access to data on a system includes receiving an identifying metric and processing the metric by salting, hashing, encrypting, or a combination thereof the metric to obtain a table lookup value. The table lookup value is used to index a PW hash table to retrieve a security value. The security value is used to update the contents of a hardware register value such as a selected platform configuration register (PCR) of a Trusted Platform Module (TPM). A selected cryptographic key is then released to the user if the hardware register value matches a predetermined value. In this embodiment, each of a set of security values corresponds to a cryptographic key and each cryptographic key corresponds to one of the levels of access to data. |
---|---|
Bibliography: | Application Number: US20030746783 |