Method and apparatus for migrating software-based security...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S167000, C713S189000

Reexamination Certificate

active

07636442

ABSTRACT:
A first processing system determines whether a second processing system provides a trustworthy state for supporting a virtual security coprocessor. In response to determining that the second processing system provides a trustworthy state for supporting the virtual security coprocessor, the first processing system transfers the virtual security coprocessor to the second processing system. In one embodiment, the first processing system receives a key and proof of bindings of the key from the second processing system. The first processing system may determine whether the second processing system provides a trustworthy state for migration of the virtual security coprocessor, based at least in part on the proof of bindings received from the second processing system. After the second processing system receives the virtual security coprocessor, the virtual security coprocessor may be removed from the first processing system. Other embodiments are described and claimed.

REFERENCES:
patent: 6813703 (2004-11-01), Nishikawa et al.
patent: 6895501 (2005-05-01), Salowey
patent: 6922774 (2005-07-01), Meushaw et al.
patent: 7076655 (2006-07-01), Griffin et al.
patent: 7177967 (2007-02-01), Jeyasingh et al.
patent: 7222062 (2007-05-01), Goud et al.
patent: 7380119 (2008-05-01), Bade et al.
patent: 7478233 (2009-01-01), Olson et al.
patent: 2002/0193615 (2002-12-01), Aksela et al.
patent: 2002/0194482 (2002-12-01), Griffin et al.
patent: 2003/0023776 (2003-01-01), Kolinummi et al.
patent: 2003/0115453 (2003-06-01), Grawrock
patent: 2003/0226031 (2003-12-01), Proudler et al.
patent: 2003/0229485 (2003-12-01), Nishikawa et al.
patent: 2004/0264797 (2004-12-01), Lippincott et al.
patent: 2005/0086509 (2005-04-01), Ranganathan
patent: 2005/0132122 (2005-06-01), Rozas
patent: 2005/0246552 (2005-11-01), Bade et al.
patent: 2005/0286792 (2005-12-01), Tadas et al.
patent: 2006/0002471 (2006-01-01), Lippincott et al.
patent: 2006/0140501 (2006-06-01), Tadas
patent: 2006/0230401 (2006-10-01), Grawrock
patent: 2006/0256108 (2006-11-01), Scaralata
patent: 2007/0043896 (2007-02-01), Daruwala et al.
patent: 2007/0094719 (2007-04-01), Scarlata
patent: 02/06929 (2002-01-01), None
Petroni et al., “Copilot—a Coprocessor-based Kemal Runtime Integrity Monitor”, Proceedings ofthe 13th USENIX Security Symposium, San Diego, CA, Aug. 9-13, 2004, 17 pgs.
Mario Strasser, “A Sotware-based TPM Emulator for Linux”, Semester Thesis, Eidgenssische Technische Hochschule Zurich, Jul. 2004, Zurich, Switzerland, 52 pgs.
David Grawrock et al., “The Intel Safer Computing Initiative”, Jan. 2006, 282 pgs.
TPM Main, Part 1: Design Principles, Specification Version 1.2, Revision 94, Mar. 29, 2006, Trusted Computing Group, TCG Published 2003-2006, 180 pgs.
Charles S. Powell et al., “Foundations for Trusted Computing”, Infenion Technologies AG, London, England, Nov. 7th, 2002, 87 pgs.
Trusted Computing Platform Alliance (TCPA) Main Specification, Version 1.1b, Trusted Computing Group, 2003, 332 pgs.
Intel Corp., “Intel Trusted Execution Technology”, Preliminary Architecture Specification, Nov. 2006, 104 pgs.
Ahmad-Reza Sadeghi et al., “Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms”, 2004, pgs. 67-77.
Carlos Rozas et al., “Dynamic Measurement of an Operating System in a Virtualized System”, U.S. Appl. No. 11/513,963, filed Aug. 31, 2006.
Stefan Berger et al., “vTPM: Virtualizing the Trusted Platform Module”, Security '06: 15th USENIX Security Symposium, pp. 305-320.
Carlos Rozas et al., “Methods and Apparatus for Remeasuring a Virtual Machine Monitor”, U.S. Appl. No. 11/648,103, filed Dec. 29, 2006.
U.S. Appl. No. 11/095,034, filed Mar. 31, 2004, Grawrock.
U.S. Appl. No. 10/876,994, filed Jun. 24, 2005, Rozas et al.
http://www.cl.cam.ac.uk/Research/SRG
etos/papers/2003-xensosp.pdf—“Xen and the Art of Virtualization”.
http://www.cl.cam.as.uk/Research/SRG
etos/papers/2004-oasis-ngio.pdf—“Safe Hardware Access with the Xen Virtual Machine Monitor”.
http://www.ece.cmu.edu/˜adrian/630-f04/readings/sailer-zhang-jaeger-doorn-2004.pdf—“Design and Implementation of a TCG-based Integrity Measurement Architecture”.
http://www.cs.rochester.edu/sosp2003/papers/p116-swift.pdf—“Improving the Reliability of Commodity Operating Systems”.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for migrating software-based security... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for migrating software-based security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for migrating software-based security... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4089374

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.