International Business Machines Corporation
Auditably proving a usage history of an asset

Last updated:

Abstract:

Auditably proving a usage history of an asset, in which the asset includes a hardware security module with at least a public key and a private key. A client application logs hash values of a pair of request data and response data. Usage history of the asset is proved. The proving includes verifying, using the public key, a signature of other hash values of the pair of request data and response data. The other hash values are signed with the private key. The proving further includes comparing the hash values logged by the client application with the other hash values.

Status:
Grant
Type:

Utility

Filling date:

24 Jun 2019

Issue date:

3 Aug 2021