Client-side boot domains and boot rules

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S175000

Reexamination Certificate

active

06978365

ABSTRACT:
Each software component loaded for a verified operating system on a client computer must satisfy a set of boot rules for a boot certificate. A verified operating system identifier is created from the boot certificate. The boot certificate is published and signed by a boot authority that attests to the validity of the operating system booted under the boot certificate. Each software component for the operating system is associated with a component certificate published and signed by the same boot authority that signed the boot certificate. The boot rules determine the validity of the software component based on the contents of the component and boot certificates. The client computer can transmit the verified operating system identity and the boot certificate to a server computer, such as a content provider, and the content provider can determine whether to trust the verified operating system with its content.

REFERENCES:
patent: 4827508 (1989-05-01), Shear
patent: 4969189 (1990-11-01), Ohta et al.
patent: 4977594 (1990-12-01), Shear
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5050213 (1991-09-01), Shear
patent: 5140634 (1992-08-01), Guillou et al.
patent: 5276311 (1994-01-01), Hennige
patent: 5335334 (1994-08-01), Takahashi et al.
patent: 5410598 (1995-04-01), Shear
patent: 5473690 (1995-12-01), Grimonprez et al.
patent: 5473692 (1995-12-01), Davis
patent: 5491827 (1996-02-01), Holtey
patent: 5544246 (1996-08-01), Mandelbaum et al.
patent: 5557518 (1996-09-01), Rosen
patent: 5654746 (1997-08-01), McMullan, Jr. et al.
patent: 5664016 (1997-09-01), Preneel et al.
patent: 5671280 (1997-09-01), Rosen
patent: 5721781 (1998-02-01), Deo et al.
patent: 5745886 (1998-04-01), Rosen
patent: 5757919 (1998-05-01), Herbert et al.
patent: 5796824 (1998-08-01), Hasebe et al.
patent: 5812662 (1998-09-01), Hsu et al.
patent: 5812980 (1998-09-01), Asai
patent: 5841869 (1998-11-01), Merklin et al.
patent: 5872847 (1999-02-01), Boyle et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5892902 (1999-04-01), Clark
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5919257 (1999-07-01), Trostle
patent: 5920861 (1999-07-01), Hall et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5940504 (1999-08-01), Griswold
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5944821 (1999-08-01), Angelo
patent: 5949876 (1999-09-01), Ginter et al.
patent: 5953502 (1999-09-01), Helbig, Sr.
patent: 5958050 (1999-09-01), Griffin et al.
patent: 5963980 (1999-10-01), Coulier et al.
patent: 5982891 (1999-11-01), Ginter et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 5991876 (1999-11-01), Johnson et al.
patent: 6006332 (1999-12-01), Rabne et al.
patent: 6009274 (1999-12-01), Fletcher et al.
patent: 6009401 (1999-12-01), Horstmann
patent: 6026166 (2000-02-01), LeBourgeois
patent: 6032257 (2000-02-01), Olarig et al.
patent: 6038551 (2000-03-01), Barlow et al.
patent: 6073124 (2000-06-01), Krishman et al.
patent: 6092189 (2000-07-01), Fisher et al.
patent: 6105137 (2000-08-01), Graunke et al.
patent: 6112181 (2000-08-01), Shear et al.
patent: 6118873 (2000-09-01), Lotspeich et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6148387 (2000-11-01), Galasso et al.
patent: 6148402 (2000-11-01), Campbell
patent: 6157721 (2000-12-01), Shear et al.
patent: 6175917 (2001-01-01), Arrow et al.
patent: 6185678 (2001-02-01), Arbaugh et al.
patent: 6185683 (2001-02-01), Ginter et al.
patent: 6189100 (2001-02-01), Barr et al.
patent: 6192473 (2001-02-01), Ryan, Jr. et al.
patent: 6212636 (2001-04-01), Boyle et al.
patent: 6223284 (2001-04-01), Novoa et al.
patent: 6229894 (2001-05-01), Van Oorschot et al.
patent: 6230285 (2001-05-01), Sadowsky et al.
patent: 6237786 (2001-05-01), Ginter et al.
patent: 6240185 (2001-05-01), Van Wie et al.
patent: 6253193 (2001-06-01), Ginter et al.
patent: 6263431 (2001-07-01), Lovelace et al.
patent: 6272629 (2001-08-01), Stewart
patent: 6292569 (2001-09-01), Shear et al.
patent: 6327652 (2001-12-01), England et al.
patent: 6330588 (2001-12-01), Freeman
patent: 6338139 (2002-01-01), Ando et al.
patent: 6341373 (2002-01-01), Shaw
patent: 6363486 (2002-03-01), Knapton, III
patent: 6363488 (2002-03-01), Ginter et al.
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6381741 (2002-04-01), Shaw
patent: 6389402 (2002-05-01), Ginter et al.
patent: 6389537 (2002-05-01), Davis et al.
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6449367 (2002-09-01), Van Wie et al.
patent: 6477252 (2002-11-01), Faber et al.
patent: 6477648 (2002-11-01), Schell et al.
patent: 6480961 (2002-11-01), Rajasekharan et al.
patent: 6560706 (2003-05-01), Carbajal et al.
patent: 6609199 (2003-08-01), DeTreville
patent: 6640304 (2003-10-01), Ginter et al.
patent: 6820063 (2004-11-01), England et al.
patent: 2002/0007452 (2002-01-01), Traw et al.
patent: 2002/0069365 (2002-06-01), Howard et al.
patent: 2002/0107803 (2002-08-01), Lisanke et al.
patent: 2002/0120936 (2002-08-01), Del Beccaro et al.
patent: 2002/0152173 (2002-10-01), Rudd
patent: 0 695 985 (1996-02-01), None
patent: 2260629 (1993-04-01), None
patent: WO 99 38070 (1999-07-01), None
Abadi et al., “Authentication and Delegation with Smart-Cards”, Jul. 20, 1992, 30 pages.
Murphy et al., “Preventing Policy: Authorization Software May Ease Hollywood's Fear of the Net”, Internet World Magazine, Apr. 1, 2000, 3 pages.
“Internet Security: SanDisk and New Microsoft Technology Provide Copy Protected Music for Internet Music Player Market”, (Product Annoucement), Edge: Work Group Computing Report, Apr. 9, 1999, 2 pages.
“Phoenix Technologies Partners with Secure Computing in Enterprise Security Marketplace”, Jul. 2, 2001, Business Wife, Courtesy of Dialog Text Search, p. 1-2.
Schneier, B., “Applied Cryptography”, Applied Cryptography. Protocols, Algoriths and Source Code in C, 1996, p. 574-577.
Lampson et al., “Authentication in Distributed Systems: Theory and Practice”, Digital Equipment Corporation, ACM Transactions on Computer Systems, vol. 10, No. 4, Nov. 1992, p. 265-310.
Clark et al., “BITS: A Smartcard Protected Operating System”, Communications on the ACm, Nov. 1994, vol. 37, No. 11, p. 66-94.
Yee, Bennet, “Using Secure Coprocessors”, School of Computer Science, Carnegie Mellon University, 1994, pp. i-vi, 1-94.
Young, Robbin, “Facing An Internet Security Minefield, Microsoft Hardens NT Server's Defenses”, Windows Watcher, Sept. 12, 1997, vol. 7, Issue 9, 8 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Client-side boot domains and boot rules does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Client-side boot domains and boot rules, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Client-side boot domains and boot rules will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3483932

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.