Theft deterrence using trusted platform module authorization

A method for theft deterrence of a computer system is disclosed. The computer system includes a trusted platform module (TPM) and storage medium. The method comprises providing a binding key in the TPM; and providing an encrypted symmetric key in the storage medium. The method further includes provi...

Full description

Saved in:
Bibliographic Details
Main Authors CATHERMAN RYAN C, PENNISI JOSEPH M, HOFF JAMES P, SPRINGFIELD RANDALL S, CHALLENER DAVID C
Format Patent
LanguageEnglish
Published 11.05.2006
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method for theft deterrence of a computer system is disclosed. The computer system includes a trusted platform module (TPM) and storage medium. The method comprises providing a binding key in the TPM; and providing an encrypted symmetric key in the storage medium. The method further includes providing an unbind command to the TPM based upon an authorization to provide a decrypted symmetric key; and providing the decrypted symmetric key to the secure storage device to allow for use of the computer system. Accordingly, by utilizing a secure hard disk drive (HDD) that requires a decrypted key to function in conjunction with a TPM, a computer if stolen is virtually unusable by the thief. In so doing, the risk of theft of the computer is significantly reduced.
Bibliography:Application Number: US20040984400