Method and apparatus for limiting access to sensitive data

Electrical computers and digital processing systems: support – Digital data processing system initialization or configuration – Loading initialization program

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S001000, C713S100000

Reexamination Certificate

active

07840795

ABSTRACT:
Disclosed is a method and apparatus for sharing sensitive data. A trusted operating system is configured to securely execute boot instructions for one or more hardware component. A virtual operating system in communication with the trusted operating system is configured with one or more security policies defining access rights associated with the one or more hardware component.

REFERENCES:
patent: 5692124 (1997-11-01), Holden et al.
patent: 5859966 (1999-01-01), Hayman et al.
patent: 6073237 (2000-06-01), Ellison
patent: 6272086 (2001-08-01), Jaquette et al.
patent: 6317836 (2001-11-01), Goren et al.
patent: 6965968 (2005-11-01), Touboul
patent: 7069442 (2006-06-01), Sutton et al.
patent: 7076655 (2006-07-01), Griffin et al.
patent: 7167987 (2007-01-01), Angelo
patent: 7424709 (2008-09-01), Neiger et al.
patent: 7506170 (2009-03-01), Finnegan
patent: 7591003 (2009-09-01), Focke et al.
patent: 7631196 (2009-12-01), Kozuch et al.
patent: 2005/0138423 (2005-06-01), Ranganathan
patent: 2006/0123056 (2006-06-01), Darbha et al.
Suh, G., et al., “The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing”, Technical Report LCS-TM-461, Massachusetts Institute of Technology, Feb. 2003, pp. 1-19.
Tucek, J., et al., “Trade-offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions”, Conference on Mass Storage Systems and Technologies, 2005, pp. 101-112.
Aiello, W., et al., “Using Smartcards to Secure a Personalized Gambling Device”, Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999, pp. 128-137.
Marsh, D., “Output Content Protection and Windows Vista”, 2005, http://download.microsoft.com/download/5/D/6/5D6EAF2B-7DDF-476B-93DC-7CF0072878E6/output—protect.doc, Downloaded on May 25, 2007, pp. 1-45.
Marsh, D., “Longhorn Output Content Protection”, http://www.download.microsoft.com/download/9/8/f/98f3fe47-dfc3-4e74-92a3-088782200fe7/TWEN05006—WinHEC05.ppt, Downloaded on May 25, 2007, 44 pgs.
Gutmann, P., “A Cost Analysis of Windows Vista Content Protection”, http://www.cs.auckland.ac.nz/˜pgut001/pubs/vista—cost.html, Downloaded on May 25, 2007, pp. 1-44.
VMWare Corp., “VMWare ACE Administrator's Manuel”, http://www.vmware.com/pdf/vmware—ace2—manual.pdf, Downloaded on May 25, 2007, pp. 1-282.
“OmniAccess 3500 Nonstop Laptop Guardian”, http://www1.alcatel-lucent.com/enterprise/en/products/enterprise-security/omniaccess3500/?—requestid=279054, Downloaded on May 25, 2007, 1 page.
“GRUB TCG Patch to Support Trusted Boot”, http://trousers.sourceforge.net/grub.html, Downloaded on May 25, 2007, pp. 1-6.
“Embassy Trust Suite”, http://www.wavesys.com/products/ets.html, Downloaded on May 25, 2007, pp. 1-2.
“BitLocker Drive Encryption”, http://technet.microsoft.com/en-us/windowsvista/aa905065.aspx, Downloaded on May 25, 2007, 1 page.
“Seagate Technology—Seagate Delivers Industry's Strongest Security for ASI Laptop Computers”, http://www.seagate.com/ww/v/index.jsp?locale=en-US&name=ASI—Laptop Release—Sally&vgnextoid=9eb309beea731110VgnVCM100000f5ee0a0aRCRD, Downloaded on May 25, 2007, 1 page.
“Microsoft Biometric ID Technology”, http://www.microsoft.com/products/msbit/default.mspx, Downloaded on May 25, 2007, 1 page.
“Utimaco”, http://www.utimaco.com/C12570CF0030C00A/CurrentBaseLink/W26K9K3U965OBELEN, Downloaded on May 25, 2007, pp. 1-3.
An Introduction to Virtualization, http://www.kernelthread.com/publications/virtualization/, Amit Singh, Written in Jan. 2004 (unconfirmed), publication date unknown.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for limiting access to sensitive data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for limiting access to sensitive data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for limiting access to sensitive data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4246215

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.