Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2011-04-05
2011-04-05
Jung, David Y (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C713S165000, C713S167000
Reexamination Certificate
active
07921286
ABSTRACT:
Dynamic Root of Trust for Measurement (DRTM) mechanisms can be initiated, not by CPU-manufacturer-specific instructions, but by the execution of code in System Management Mode (SMM) that can modify the values stored in specific Platform Configuration Registers (PCRs) of a Trusted Platform Module (TPM). The SMM code can be verified prior to execution and it can be trusted based on the secure mechanisms used to update such code. The SMM code can restore a known, trusted state of the computing device and can initiate the measuring of subsequently executed code. In such a manner the Trusted Computing Base (TCB) can be limited.
REFERENCES:
patent: 5974573 (1999-10-01), Martin
patent: 6782349 (2004-08-01), Challener et al.
patent: 7210034 (2007-04-01), Smith
patent: 7747848 (2010-06-01), Nallagatla et al.
patent: 2003/0182561 (2003-09-01), Challener et al.
patent: 2004/0003288 (2004-01-01), Wiseman et al.
patent: 2005/0021968 (2005-01-01), Zimmer et al.
patent: 2005/0033972 (2005-02-01), Watson
patent: 2005/0108564 (2005-05-01), Freeman et al.
patent: 2005/0114639 (2005-05-01), Zimmer
patent: 2005/0262571 (2005-11-01), Zimmer et al.
patent: 2006/0010326 (2006-01-01), Bade et al.
patent: 2006/0242406 (2006-10-01), Barde et al.
patent: 2007/0198604 (2007-08-01), Okada et al.
CPU MISER: A Performance-Directed, Run-Time System for Power-Aware Clusters; Rong Ge; Xizhou Feng; Wu-chun Feng; Cameron, K.W.; Parallel Processing, 2007. ICPP 2007. International Conference on Publication Year: 2007 , pp. 18.
IBM Redbooks | Introduction to the System z Hardware Management Console, printed year 2010.
Microsoft Management Console; From Wikipedia, the free encyclopedia; printed year 2010.
Dell Systems Management Consoles; Dell; printed year 2010.
Sailer, et al., “Design and Implementation of a TCG-based Integrity Measurement Architecture” , Proceedings of the 13th USENIX Security Syposium, Aug. 9-13, USENIX Association, 2004, pp. 17.
Pearson, et al., “Analysis of Trust Properties and Related Impact of Trusted Platforms” , 2005, Hewlett-Packard Development Company, pp. 18.
Garriss, et al., “Towards Trustworthy Kiosk Computing”, Proceedings of 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile), Feb. 2007, pp. 1-7.
Jung David Y
Microsoft Corporation
LandOfFree
Computer initialization for secure kernel does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer initialization for secure kernel, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer initialization for secure kernel will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2707205