Determining user security level using trusted hardware device

A system and method for enabling multiple levels of access to data on a system includes receiving an identifying metric and processing the metric by salting, hashing, encrypting, or a combination thereof the metric to obtain a table lookup value. The table lookup value is used to index a PW hash tab...

Full description

Saved in:
Bibliographic Details
Main Authors SPRINGFIELD RANDALL S, CHALLENER DAVID C
Format Patent
LanguageEnglish
Published 23.06.2005
Edition7
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A system and method for enabling multiple levels of access to data on a system includes receiving an identifying metric and processing the metric by salting, hashing, encrypting, or a combination thereof the metric to obtain a table lookup value. The table lookup value is used to index a PW hash table to retrieve a security value. The security value is used to update the contents of a hardware register value such as a selected platform configuration register (PCR) of a Trusted Platform Module (TPM). A selected cryptographic key is then released to the user if the hardware register value matches a predetermined value. In this embodiment, each of a set of security values corresponds to a cryptographic key and each cryptographic key corresponds to one of the levels of access to data.
Bibliography:Application Number: US20030746783