Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2006-01-10
2006-01-10
Smithers, Matthew (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C714S013000, C711S162000
Reexamination Certificate
active
06986042
ABSTRACT:
When software is loaded into an operating system kernel and so has access the same memory space as the operating system a problem occurs if the operating system cannot determine in advance whether the operating system will afterwards be in a suitably trusted state or not. By using a high availability cluster in which each System Processing Unit (S1, S2) has a trusted device, it is possible to gain more trust and a more flexible approach to trust whilst maintaining the high availability properties of the cluster. Software can be loaded onto one of at least two computing platforms (S1) of a computing system. Another of the platforms (S2) performs integrity tests on the platform (S1) carrying the new software to check whether the platform (S1) is still in a trusted state. If the tests are passed, then the test results are signed and sent to the platform (S1) with the new software and the new software is copied onto the other computing platform (S2). If the tests are failed, then the first platform (S1) can either be rebooted or returned to the state of the testing platform (S2).
REFERENCES:
patent: 4654846 (1987-03-01), Goodwin et al.
patent: 4965714 (1990-10-01), Knecht
patent: 5345590 (1994-09-01), Ault et al.
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5680547 (1997-10-01), Chang
patent: 5844986 (1998-12-01), Davis
patent: 6330670 (2001-12-01), England et al.
patent: 6363497 (2002-03-01), Chrabaszcz
patent: 0 997 807 (2000-05-01), None
patent: 1030237 (2000-08-01), None
patent: 00/48063 (2000-08-01), None
patent: WO 00/48063 (2000-08-01), None
Araki, et al., “A non-stop updating technique for device driver programs on the IROS platform,”Communications—Gateway to Globalization, Proceedings of the International Conference on Communications, vol. 1, Jun. 18, 1995, pp. 88-92.
Anderson, R. and Markus Kuhn, “Tamper Resistance—a Cautionary Note,” 16 pages, located at Internet address <www.cl.cam.ac.uk/˜mgk25/tamper.html> (1996).
Intel, “Wired for Management Baseline specification v2.0,”Boot Integrity Services Application Programming Interface Version 1.0, 64 pages (Dec. 28, 1998).
“Information technology-Security techniques-Entity Authentication—Part 3: Mechanisms using digital signature techniques,”ISO/IEC 9798-3, 6 pages (1998).
Yee, B., “Using Secure Coprocessors,” Doctoral thesis—Carnegie Mellon University, pp. 1-94 (May 1994).
“Building a Foundation of Trust in the PC,”Trusted Computing Platform Alliance, pp. 1-7 (Jan. 2000).
“Information technology—Security techniques—Key management—Part 3: Mechanisms using asymmetric techniques,”ISO/IEC 11770-3, pp. 1-34 (1999).
Trusted Computing Platform Alliance (TCPA), Main Specification, Version 1.0, pp. 1-284 (2000).
Hewlett--Packard Development Company, L.P.
Smithers Matthew
Teslovich Tamara
LandOfFree
Computer system operable to revert to a trusted state does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer system operable to revert to a trusted state, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer system operable to revert to a trusted state will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3525861