Computer system operable to revert to a trusted state

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C714S013000, C711S162000

Reexamination Certificate

active

06986042

ABSTRACT:
When software is loaded into an operating system kernel and so has access the same memory space as the operating system a problem occurs if the operating system cannot determine in advance whether the operating system will afterwards be in a suitably trusted state or not. By using a high availability cluster in which each System Processing Unit (S1, S2) has a trusted device, it is possible to gain more trust and a more flexible approach to trust whilst maintaining the high availability properties of the cluster. Software can be loaded onto one of at least two computing platforms (S1) of a computing system. Another of the platforms (S2) performs integrity tests on the platform (S1) carrying the new software to check whether the platform (S1) is still in a trusted state. If the tests are passed, then the test results are signed and sent to the platform (S1) with the new software and the new software is copied onto the other computing platform (S2). If the tests are failed, then the first platform (S1) can either be rebooted or returned to the state of the testing platform (S2).

REFERENCES:
patent: 4654846 (1987-03-01), Goodwin et al.
patent: 4965714 (1990-10-01), Knecht
patent: 5345590 (1994-09-01), Ault et al.
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5680547 (1997-10-01), Chang
patent: 5844986 (1998-12-01), Davis
patent: 6330670 (2001-12-01), England et al.
patent: 6363497 (2002-03-01), Chrabaszcz
patent: 0 997 807 (2000-05-01), None
patent: 1030237 (2000-08-01), None
patent: 00/48063 (2000-08-01), None
patent: WO 00/48063 (2000-08-01), None
Araki, et al., “A non-stop updating technique for device driver programs on the IROS platform,”Communications—Gateway to Globalization, Proceedings of the International Conference on Communications, vol. 1, Jun. 18, 1995, pp. 88-92.
Anderson, R. and Markus Kuhn, “Tamper Resistance—a Cautionary Note,” 16 pages, located at Internet address <www.cl.cam.ac.uk/˜mgk25/tamper.html> (1996).
Intel, “Wired for Management Baseline specification v2.0,”Boot Integrity Services Application Programming Interface Version 1.0, 64 pages (Dec. 28, 1998).
“Information technology-Security techniques-Entity Authentication—Part 3: Mechanisms using digital signature techniques,”ISO/IEC 9798-3, 6 pages (1998).
Yee, B., “Using Secure Coprocessors,” Doctoral thesis—Carnegie Mellon University, pp. 1-94 (May 1994).
“Building a Foundation of Trust in the PC,”Trusted Computing Platform Alliance, pp. 1-7 (Jan. 2000).
“Information technology—Security techniques—Key management—Part 3: Mechanisms using asymmetric techniques,”ISO/IEC 11770-3, pp. 1-34 (1999).
Trusted Computing Platform Alliance (TCPA), Main Specification, Version 1.0, pp. 1-284 (2000).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer system operable to revert to a trusted state does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer system operable to revert to a trusted state, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer system operable to revert to a trusted state will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3525861

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.