| CPC H04L 9/3263 (2013.01) [G06F 21/575 (2013.01); H04L 9/0643 (2013.01); H04L 9/0825 (2013.01); H04L 9/0894 (2013.01); H04L 9/3247 (2013.01); H04L 9/3278 (2013.01); H04L 63/0428 (2013.01); H04L 63/0876 (2013.01)] | 32 Claims |

|
1. A method for secure computing, the method comprising:
decrypting, by a processing device and using a private key of a first public/private key pair, an encrypted block of data received from a first computing device, the encrypted block of data comprising an identifier of the processing device and a hash of a session public key of a session key pair;
verifying the identifier of the processing device matches a value encoded based on a secure physical object of the processing device;
matching a software verification value from a portion of a secure program to the hash of the session public key; and
executing, by the processing device and based on verifying the identifier of the processing device, the matching of the software verification value to the hash of the session public key, and performing a digital signature verification of secure program using a public key of a second public/private key pair, the secure program to secure boot the processing device, the second public/private key pair being different from the first public/private key pair.
|