A method and apparatus for enabling hardware platform identification while ensuring privacy protection. The apparatus comprises a computer-readable medium that stores computer-executable instructions. Those instructions, when executed by a microprocessor, cause an expected hash value, which is derived from a key and a first identifier for a computer system; to be compared with a hash value, which is derived from the key and a second identifier for a computer system. A microprocessor for executing those instructions may comprise an identifier that identifies the microprocessor, and embedded instructions for comparing a hash value, derived from the identifier and a key, to an expected hash value.

 
Web www.patentalert.com

< Method of designing integrated circuit having both configurable and fixed logic circuitry

< Method and system for providing time-shifted delivery of live media programs

> ISCSI target offload administrator

> Method and apparatus for the detection, notification, and elimination of certain computer viruses on a network using a promiscuous system as bait

~ 00212