Cryptography – Key management – Key distribution
Reexamination Certificate
2009-09-21
2011-11-29
Dada, Beemnet W (Department: 2435)
Cryptography
Key management
Key distribution
C713S167000, C713S189000
Reexamination Certificate
active
08068613
ABSTRACT:
A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed.
REFERENCES:
patent: 6813703 (2004-11-01), Nishikawa et al.
patent: 6895501 (2005-05-01), Salowey
patent: 6922774 (2005-07-01), Meushaw et al.
patent: 7058807 (2006-06-01), Grawrock et al.
patent: 7076655 (2006-07-01), Griffin et al.
patent: 7177967 (2007-02-01), Jeyasingh et al.
patent: 7222062 (2007-05-01), Goud et al.
patent: 7380119 (2008-05-01), Bade et al.
patent: 7454544 (2008-11-01), Bond et al.
patent: 7478233 (2009-01-01), Olson et al.
patent: 7512815 (2009-03-01), Munetoh
patent: 7552419 (2009-06-01), Zimmer et al.
patent: 2002/0193615 (2002-12-01), Aksela et al.
patent: 2002/0194482 (2002-12-01), Griffin et al.
patent: 2003/0023776 (2003-01-01), Kolinummi et al.
patent: 2003/0115453 (2003-06-01), Grawrock
patent: 2003/0115468 (2003-06-01), Aull et al.
patent: 2003/0226031 (2003-12-01), Proudler et al.
patent: 2003/0229485 (2003-12-01), Nishikawa et al.
patent: 2004/0031030 (2004-02-01), Kidder et al.
patent: 2004/0264797 (2004-12-01), Lippincott et al.
patent: 2005/0086509 (2005-04-01), Ranganathan
patent: 2005/0130611 (2005-06-01), Lu et al.
patent: 2005/0132122 (2005-06-01), Rozas
patent: 2005/0133582 (2005-06-01), Bajikar
patent: 2005/0138370 (2005-06-01), Goud et al.
patent: 2005/0144440 (2005-06-01), Catherman et al.
patent: 2005/0166024 (2005-07-01), Angelo et al.
patent: 2005/0246552 (2005-11-01), Bade et al.
patent: 2005/0286792 (2005-12-01), Tadas et al.
patent: 2006/0002471 (2006-01-01), Lippincott et al.
patent: 2006/0020781 (2006-01-01), Scarlata et al.
patent: 2006/0031436 (2006-02-01), Sakata et al.
patent: 2006/0075223 (2006-04-01), Bade et al.
patent: 2006/0140501 (2006-06-01), Tadas
patent: 2006/0190986 (2006-08-01), Mont et al.
patent: 2006/0230401 (2006-10-01), Grawrock
patent: 2006/0256105 (2006-11-01), Scarlata
patent: 2006/0256107 (2006-11-01), Scarlata
patent: 2006/0256108 (2006-11-01), Scarlata
patent: 2007/0043896 (2007-02-01), Daruwala et al.
patent: 2007/0094719 (2007-04-01), Scarlata
patent: 2007/0226786 (2007-09-01), Berger et al.
patent: 2007/0256125 (2007-11-01), Chen
patent: 2007/0300069 (2007-12-01), Rozas
patent: 2009/0169012 (2009-07-01), Smith et al.
patent: 0206929 (2002-01-01), None
U.S. Patent and Trademark Office, Office Action mailed Mar. 10, 2010 with Reply filed on Jun. 9, 2010, in U.S. Appl. No. 11/512,989.
U.S. Patent and Trademark Office, Office Action Mailed Oct. 7, 2009 with Reply Filed on Jan. 7, 2010, in U.S. Appl. No. 11/474,778.
U.S. Patent and Trademark Office, Final Office Action Mailed Mar. 19, 2010 with RCE Filed on Jun. 18, 2010, in U.S. Appl. No. 11/474,778.
U.S. Patent and Trademark Office, Final Office Action mailed Aug. 13, 2010 and RCE filed Nov. 11, 2010 in U.S. Appl. No. 11/512,989.
Petroni et al., “Copilot—a Coprocessor-based Kemal Runtime Integrity Monitor”, Proceedings of the 13th USENIX Security Symposium, San Diego, CA, Aug. 9-13, 2004, 17 pgs.
Mario Strasser, “A Sotware-based TPM Emulator for Linux”, Semester Thesis, Edgenssische Technische Hochschule Zurich, Jul. 2004, Zurich, Switzerland, 52 pgs.
David Grawrock et al., “The Intel Safer Computing initiative”, Jan. 2006, 282 pgs.
TPM Main, Part 1: Design Principles, Specification Version 1.2, Revision 94, Mar. 29, 2006, Trusted Computing Group, TCG Published 2003-2006, 180 pgs.
Charles S. Powell et al., “Foundations for Trusted Computing”, Infineon Technologies AG, London, England, Nov. 7th, 2002, 87 pgs.
Intel Corp., “Intel Trusted Execution Technology”, Preliminary Architecture Specification, Nov. 2000, 104 pgs.
Carlos Rozas et al., “Dynamic Measurement of an Operating System in a Virtualized System”, U.S. Appl. No. 11/513,963, filed Aug. 31, 2006.
Carlos Rozas et al., “Methods and Apparatus for Remeasuring a Virtual Machine Monitor”, U.S. Appl. No. 11/648,103, filed Dec. 29, 2006.
U.S. Appl. No. 11/095,034, filed Mar. 31, 2005, Grawock.
U.S. Appl. No. 10/876,994, filed Jun. 24, 2004, Razas et al.
Method and Apparatus for Migrating Software-Based Security Coprocessors Inventors: Vincent R. Scarlata Carlos V. Rozas.
Method and Apparatus for Generating Endorsement Credentials for Software-Based Security Coprocessors Inventors: Vincent R. Scarlata Willard M. Wiseman.
Method and Apparatus for Providing Software-Based Security Coprocessors Inventors: Vincent R. Scarlata Carlos V. Rozas.
http://www.prosec.rub.de/trusted—grub.html—“Trusted grub”.
http://www.vmware.com
ews/releases/ace—announce.html—“VMware Reinvents Enterprise Desktop Management and Security with Breakthrough New Product”.
http://www.cl.cam.ac.uk/Research/SRG
etos/papers/2003-xensosp.pdf—“Xen and the Art of Virtualization”.
http://www.eecs.umich.edu/CoVirt/papers/revirt.pdf—“ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay”.
http://ieeexplore.ieee.org/ie15/2/20660/00955100.pdf?arnumber=955100—“Building the IBM 4758 Secure Coprocessor”.
http://www.cl.cam.ac.uk/Research/SRG
etos/papers/2004-oasis-ngio.pdf—“Safe Hardware Access with the Xen Virtual Machine Monitor”.
http://www.cs.utexas.edu/˜shmat/courses/cs395t—fall04/rager.pdf—“TERRA: A Virtual Machine-Based Platform For Trusted Computing” (presentation).
https://www.trustedcomputinggroup.org/home—“What is the Trusted Computing Group?” (Internet home page).
http://www.cs.dartmouth.edu/˜sws/papers/mswm03.pdf—“Experimenting with TCPA/TCG Hardware”.
http://www.vmware.com/pdf/TechTrendNotes.pdf—“NetTop: Commercial Technology in High Assurance Applications”.
http://www.research.ibm.com/gsal/tcpa/why—tcpa.pdf—“The Need for TCPA”.
http://www.ece.cmu.edu/˜adrian/630-f04/readings/sailer-zhang-jaeger-doorn-2004.pdf—“Design and Implementation of a TCG-based Integrity Measurement Architecture”.
http://www.cs.rochester.edu/sosp2003/papers/p116-swift.pdf—“Improving the Reliability of Commodity Operating Systems”.
http://www.stanford.edu/˜talg/papers/SOSP03/terra.pdf—“Terra: A Virtual Machine-Based Platform for Trusted Computing” (article).
U.S. Patent and Trademark Office, Office Action mailed Aug. 17, 2010 with Reply filed on Nov. 17, 2010 in U.S. Appl. No. 11/474,778.
U.S. Patent and Trademark Office, Non-Final Office Action mailed Mar. 21, 2011 in U.S. Appl. No. 11/512,989.
U.S. Appl. No. 11/512,989 Reply to Office Action mailed Mar. 21, 2011 filed on Jun. 23, 2011.
U.S. Patent and Trademark Office, Office Action mailed Feb. 2, 2011 with Reply filed May 2, 2011 in U.S. Appl. No. 11/474,778.
U.S. Patent and Trademark Office, Final Office Action mailed Jul. 1, 2011 in U.S. Appl. No. 11/474,778.
Request for Continued Examination (RCE) filed on Aug. 29, 2011 in U.S. Appl. No. 11/474,778.
U.S. Patent and Trademark Office, Notice of Allowance Mailed Sep. 1, 2011 in U.S. Appl. No. 11/512,989.
Dada Beemnet W
Intel Corporation
Trop Pruner & Hu P.C.
LandOfFree
Method and apparatus for remotely provisioning... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for remotely provisioning..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for remotely provisioning... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4296704