A method, system and computer program product for enhancing the functionality of the existing core root of trust measurement (CRTM). The CRTM is extended to allow platform manufacturer controlled and certified code to be incorporated into the function of the CRTM, wherein the manufacturer may define the policy for accepting a new function into the CRTM. When a firmware or software module image is compiled, the build process generates a hash value of the compiled firmware or software image, wherein the hash value reflects a fingerprint (or short hand) representation of the compiled image. A determination is made as to whether the hash value of the firmware or software image is to be a CRTM extension. If so, a digital signature of the module is created using the CRTM extension private key. This signature value is added to the firmware or software module.

 
Web www.patentalert.com

< Atomically updating 64 bit fields in the 32 bit AIX kernel

< Systems for loading unaligned words and methods of operating the same

> Cascading failover of a data management application for shared disk file systems in loosely coupled node clusters

> System and method for predictive processor failure recovery

~ 00231