Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2004-12-20
2009-02-24
Revak, Christopher A (Department: 2131)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S175000, C713S176000, C705S051000, C711S154000
Reexamination Certificate
active
07496769
ABSTRACT:
An architecture for protecting premium content in a nonsecure computer environment executes only a small number of code modules in a secure memory. The modules are arranged in a hierarchy of trust, where a module names other modules that it is willing to trust, and those modules in turn name other modules that they are willing to trust. A secure loader loads a security manager that oversees a number of content-providing modules for manipulating the content. A memory manager assigns permissions to various pages of the secure memory. The memory has rings of different security. The security model can be extended to program modules and other devices on the computer's bus, such as DMA controllers and peripherals.
REFERENCES:
patent: 5335334 (1994-08-01), Takahashi et al.
patent: 5491827 (1996-02-01), Holtey
patent: 5548746 (1996-08-01), Carpenter et al.
patent: 5557518 (1996-09-01), Rosen
patent: 5574936 (1996-11-01), Ryba et al.
patent: 5671280 (1997-09-01), Rosen
patent: 5745886 (1998-04-01), Rosen
patent: 5841869 (1998-11-01), Merkling et al.
patent: 5872847 (1999-02-01), Boyle et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5949877 (1999-09-01), Traw et al.
patent: 5963980 (1999-10-01), Coulier et al.
patent: 5970246 (1999-10-01), Moughani et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 5991856 (1999-11-01), Spilo et al.
patent: 6105137 (2000-08-01), Graunke et al.
patent: 6185683 (2001-02-01), Ginter et al.
patent: 6192473 (2001-02-01), Ryan, Jr. et al.
patent: 6212636 (2001-04-01), Boyle et al.
patent: 6226749 (2001-05-01), Carloganu et al.
patent: 6229894 (2001-05-01), Van Oorschot et al.
patent: 6286099 (2001-09-01), Kramer
patent: 6327652 (2001-12-01), England et al.
patent: 6330588 (2001-12-01), Freeman
patent: 6338139 (2002-01-01), Ando et al.
patent: 6363486 (2002-03-01), Knapton, III
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6389537 (2002-05-01), Davis et al.
patent: 6408336 (2002-06-01), Schneider et al.
patent: 6477252 (2002-11-01), Faber et al.
patent: 6480961 (2002-11-01), Rajasekharan et al.
patent: 6513116 (2003-01-01), Valente
patent: 6532451 (2003-03-01), Schell et al.
patent: 6609199 (2003-08-01), DeTreville
patent: 6618855 (2003-09-01), Lindholm et al.
patent: 6651171 (2003-11-01), England et al.
patent: 2002/0007452 (2002-01-01), Traw et al.
patent: 2002/0069365 (2002-06-01), Howard et al.
patent: 2002/0107803 (2002-08-01), Lisanke et al.
patent: 2002/0120936 (2002-08-01), Del Beccaro et al.
patent: 2002/0152173 (2002-10-01), Rudd
patent: 2004/0015694 (2004-01-01), DeTreville
“Phoenix Technologies Partners with Secure Computing in Enterprise Security Marketplace”, Jul. 12, 2001, Business Wire, courtesy of dialog text search, p. 1-2.
England Paul
Lampson Butler W.
Lee & Hayes PLLC
Microsoft Corporation
Revak Christopher A
LandOfFree
Hierarchical trusted code for content protection in computers does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Hierarchical trusted code for content protection in computers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hierarchical trusted code for content protection in computers will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4138073