International Business Machines Corporation
Auditably proving a usage history of an asset
Last updated:
Abstract:
Auditably proving a usage history of an asset, in which the asset includes a hardware security module with at least a public key and a private key. A client application logs hash values of a pair of request data and response data. Usage history of the asset is proved. The proving includes verifying, using the public key, a signature of other hash values of the pair of request data and response data. The other hash values are signed with the private key. The proving further includes comparing the hash values logged by the client application with the other hash values.
Status:
Grant
Type:
Utility
Filling date:
24 Jun 2019
Issue date:
3 Aug 2021