A system and method for providing a system planar specific pre-load
authentication that enables a supplier of system hardware and software
components to detect assembly of unauthorized systems. The method
includes authenticating a data processing system having a hardware
inventory device that is uniquely associated with the data processing
system. First, an identifier code that uniquely identifies the data
processing system and an encrypted hash of the identifier code are stored
in non-erasable memory within a hardware inventory device prior to the
device being mounted on a system board. After mounting the hardware
inventory device on the system board, software preload is authenticated
by generating a hash of the identifier code, decrypting the encrypted
hash of the identifier code, and comparing the decrypted identifier code
hash with the generated identifier code hash to authenticate the system.
The entities providing the hardware and/or software components, maintains
a record of the system specific identifier codes enabling hardware
inventory control tracking by comparing the number of hardware inventory
devices issued to a specified system manufacturer with the number of
system boards ordered by the manufacturer.