Computer initialization for secure kernel

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S165000, C713S167000

Reexamination Certificate

active

07921286

ABSTRACT:
Dynamic Root of Trust for Measurement (DRTM) mechanisms can be initiated, not by CPU-manufacturer-specific instructions, but by the execution of code in System Management Mode (SMM) that can modify the values stored in specific Platform Configuration Registers (PCRs) of a Trusted Platform Module (TPM). The SMM code can be verified prior to execution and it can be trusted based on the secure mechanisms used to update such code. The SMM code can restore a known, trusted state of the computing device and can initiate the measuring of subsequently executed code. In such a manner the Trusted Computing Base (TCB) can be limited.

REFERENCES:
patent: 5974573 (1999-10-01), Martin
patent: 6782349 (2004-08-01), Challener et al.
patent: 7210034 (2007-04-01), Smith
patent: 7747848 (2010-06-01), Nallagatla et al.
patent: 2003/0182561 (2003-09-01), Challener et al.
patent: 2004/0003288 (2004-01-01), Wiseman et al.
patent: 2005/0021968 (2005-01-01), Zimmer et al.
patent: 2005/0033972 (2005-02-01), Watson
patent: 2005/0108564 (2005-05-01), Freeman et al.
patent: 2005/0114639 (2005-05-01), Zimmer
patent: 2005/0262571 (2005-11-01), Zimmer et al.
patent: 2006/0010326 (2006-01-01), Bade et al.
patent: 2006/0242406 (2006-10-01), Barde et al.
patent: 2007/0198604 (2007-08-01), Okada et al.
CPU MISER: A Performance-Directed, Run-Time System for Power-Aware Clusters; Rong Ge; Xizhou Feng; Wu-chun Feng; Cameron, K.W.; Parallel Processing, 2007. ICPP 2007. International Conference on Publication Year: 2007 , pp. 18.
IBM Redbooks | Introduction to the System z Hardware Management Console, printed year 2010.
Microsoft Management Console; From Wikipedia, the free encyclopedia; printed year 2010.
Dell Systems Management Consoles; Dell; printed year 2010.
Sailer, et al., “Design and Implementation of a TCG-based Integrity Measurement Architecture” , Proceedings of the 13th USENIX Security Syposium, Aug. 9-13, USENIX Association, 2004, pp. 17.
Pearson, et al., “Analysis of Trust Properties and Related Impact of Trusted Platforms” , 2005, Hewlett-Packard Development Company, pp. 18.
Garriss, et al., “Towards Trustworthy Kiosk Computing”, Proceedings of 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile), Feb. 2007, pp. 1-7.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer initialization for secure kernel does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer initialization for secure kernel, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer initialization for secure kernel will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2707205

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.