Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer
The method involves determining current feature values (15) for features of a computer, and calculating current checksums from the current feature values. The current checksums are compared with original checksums, and the current feature values are stored in a current feature value vector (13) when...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The method involves determining current feature values (15) for features of a computer, and calculating current checksums from the current feature values. The current checksums are compared with original checksums, and the current feature values are stored in a current feature value vector (13) when the original checksum and the current checksum are identical. Missing feature values in the value vector are determined by using redundancy data (7), and the value vector is completed with the determined feature values. A cryptographic key (9) is generated from the value vector. |
---|