Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2006-03-23
2011-11-15
Moazzami, Nasser (Department: 2436)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C713S189000, C713S193000
Reexamination Certificate
active
08060744
ABSTRACT:
Method for providing a single level secure (SLS) user processor (402, 502) with access to a multi-level secure (MLS) file system (300). The method begins by authenticating a user to a cryptographic processor (302) by communicating one or more types of user authentication information to the cryptographic processor. Based on such authentication, the MLS file system services are provided such that the SLS user processor (402, 502) has access to files (306, 308, 310, 312, 314) at only one defined security classification level at a time. The method also includes zeroizing one or more data stores used by the SLS user processor each time the SLS user processor transitions between accessing classified data files at a first security classification level and a second security classification level.
REFERENCES:
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4493031 (1985-01-01), Silverio
patent: 4918728 (1990-04-01), Matyas et al.
patent: 5263168 (1993-11-01), Toms et al.
patent: 5283828 (1994-02-01), Saunders et al.
patent: 5369702 (1994-11-01), Shanton
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5596718 (1997-01-01), Boebert et al.
patent: 5748744 (1998-05-01), Levy et al.
patent: 5802178 (1998-09-01), Holden et al.
patent: 5887064 (1999-03-01), Seysen
patent: 5956404 (1999-09-01), Schneier et al.
patent: 6081895 (2000-06-01), Harrison et al.
patent: 6092202 (2000-07-01), Veil et al.
patent: 6148401 (2000-11-01), Devanbu et al.
patent: 6282653 (2001-08-01), Berstis et al.
patent: 6351817 (2002-02-01), Flyntz
patent: 6378071 (2002-04-01), Sasaki et al.
patent: 6378072 (2002-04-01), Collins et al.
patent: 6671804 (2003-12-01), Kent
patent: 6775778 (2004-08-01), Laczko, Sr. et al.
patent: 7003674 (2006-02-01), Hamlin
patent: 7028149 (2006-04-01), Grawrock et al.
patent: 7069447 (2006-06-01), Corder
patent: 7072937 (2006-07-01), Neebe et al.
patent: 7302698 (2007-11-01), Proudler et al.
patent: 7322042 (2008-01-01), Srinivasan et al.
patent: 7380275 (2008-05-01), Srinivasan et al.
patent: 7392398 (2008-06-01), Shakkarwar
patent: 7543144 (2009-06-01), Rensin et al.
patent: 7698552 (2010-04-01), Wilson et al.
patent: 7765399 (2010-07-01), O'Brien
patent: 7779252 (2010-08-01), O'Brien et al.
patent: 7818574 (2010-10-01), Fayad et al.
patent: 7979714 (2011-07-01), Borsa et al.
patent: 2001/0044886 (2001-11-01), Cassagnol et al.
patent: 2002/0059238 (2002-05-01), Saito
patent: 2002/0099950 (2002-07-01), Smith
patent: 2003/0046589 (2003-03-01), Gregg
patent: 2003/0126434 (2003-07-01), Lim et al.
patent: 2003/0163740 (2003-08-01), Thjai et al.
patent: 2003/0204801 (2003-10-01), Tkacik et al.
patent: 2004/0039924 (2004-02-01), Baldwin et al.
patent: 2004/0044902 (2004-03-01), Luthi
patent: 2004/0103288 (2004-05-01), Ziv et al.
patent: 2005/0055524 (2005-03-01), Gulick et al.
patent: 2005/0114687 (2005-05-01), Zimmer et al.
patent: 2005/0132186 (2005-06-01), Khan et al.
patent: 2006/0021007 (2006-01-01), Rensin et al.
patent: 2006/0041755 (2006-02-01), Pemmaraju
patent: 2006/0078109 (2006-04-01), Akashika et al.
patent: 2006/0105740 (2006-05-01), Puranik
patent: 2006/0195907 (2006-08-01), Delfs et al.
patent: 2006/0248599 (2006-11-01), Sack et al.
patent: 2006/0251258 (2006-11-01), Lillie et al.
patent: 2006/0253711 (2006-11-01), Kallmann
patent: 2007/0214364 (2007-09-01), Roberts
patent: 2007/0226493 (2007-09-01), O'Brien et al.
patent: 2007/0226517 (2007-09-01), O'Brien et al.
patent: 2007/0250411 (2007-10-01), Williams
patent: 2007/0283159 (2007-12-01), Borsa et al.
patent: 2008/0022136 (2008-01-01), Mattsson et al.
patent: 2009/0150899 (2009-06-01), Tahan
patent: 19633919 (1997-06-01), None
patent: 0 471 538 (1992-02-01), None
patent: 0657820 (1995-06-01), None
patent: 1 085 396 (2001-03-01), None
patent: 2336005 (1999-10-01), None
patent: WO 98/39876 (1998-03-01), None
Wiki: “Multilevel Security” Wikipedia, [online] Mar. 21, 2006, XP002446615 Internet. Retrieved from the Internet: URL:http://en.wikipedia.org/w/index.php?title=Multilevel—security&oldid=44733265> [retreived on Aug. 13, 2007].
Wiki: “Multilevel Security” Wikipedia, [Online] Mar. 21, 2006, XP00246615 Internet Retrieved from the Internet: <URL:http://en.wikiedia.org/w/index.php?title=Multilevel—security&oldid=44733265>> [retrieved on Aug. 13, 2007].
Schneier, Applied Cryptography Second Edition, 1996, John Wiley & Sons, Second Edition, pp. 513-514.
U.S. Appl. No. 11/359,224, filed Feb. 22, 2006, Computer Architecture for a Handheld Electronic Device.
U.S. Appl. No. 11/385,063, filed Mar. 21, 2006, Computer Architecture for a Handheld Electronic Device with a Shared Human-Machine Interface.
U.S. Appl. No. 11/387,342, filed Mar. 23, 2006, Computer Architecture for an Electronic Device Providing a Secure File System.
U.S. Appl. No. 11/387,991, filed Mar. 23, 2006, Computer Architecture for an Electronic Device Providing Single-Level Secure Access to Multi-Level Secure File System.
U.S. Appl. No. 11/387,744, filed Mar. 23, 2006 Computer Architecture for an Electronic Device Providing SLS Access to MLS.
U.S. Appl. No. 11/445,571, filed Jun. 2, 2006, Authentication and Access Control Device.
Extended European Search Report mailed Jul. 13, 2011; Application Serial No. 11003076.4-2212 in the name of Harris Corporation.
Meadows C Ed—Institute of Electrical and Electronics Engineers: “Extending the Brewer-Nash model to a multilevel context”, Proceedings of the Symposium on Research in Security and Privacy. Oakland, May 7-9, 1990; [Proceedings of the Symposium on Research in Security and Privacy],Los Alamitos, IEEE Comp. Soc. Press, US, vol. SYMP. 11, May 7, 1990, pp. 95-102, XP010020190, DOI: D0I:10.1109/RISP.1990.63842 ISBN: 978-0-8186-2060-7.
Brewer D F C et al: “The Chinese Wall security policy”, Proceedings of the Symposium on Security and Privacy. Oakland, May 1-3, 1989; [Proceedings of the Symposium on Security and Privacy], Washington, IEEE Comp. Soc. Press, US, vol.-, May 1, 1989, pp. 206-214, XP010016022, DOI: D0I:10.1109/SECPRI.1989.36295 ISBN: 978-0-8186-1939-7.
Fraser T: “LOMAC: Low Water-Mark integrity protection for COTS environments”, Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on Berkeley, CA, USA May 14-17, 2000, Los Alamitos, CA, USA,IEEE Comput. Soc, US, May 14, 2000, pp. 230-245, XP010501138, DOI:DOI:10.1109/SECPRI.2000.848460 ISBN: 978-0-7695-0665-4.
Blessing John
Murray Jeffrey
O'Brien Terence W.
Schmalbach Richard
Fox Rothschild LLP
Harris Corporation
Moazzami Nasser
Sacco Robert J.
Shehni Ghazal
LandOfFree
Computer architecture for an electronic device providing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer architecture for an electronic device providing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer architecture for an electronic device providing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4274865