Method and apparatus for secure execution using a secure...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000

Reexamination Certificate

active

06986052

ABSTRACT:
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor also contains cryptographic logic coupled to the execution unit that encrypts and decrypts secure data and code.

REFERENCES:
patent: 4573119 (1986-02-01), Westheimer et al.
patent: 5249232 (1993-09-01), Erbes et al.
patent: 5471599 (1995-11-01), Brodnax et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 6012141 (2000-01-01), Isaman
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6651171 (2003-11-01), England et al.
patent: 42 17444.9 (1992-12-01), None
patent: 0473913 (1992-03-01), None
patent: 0600112 (1994-06-01), None
patent: 0892521 (1999-01-01), None
patent: 0930567 (1999-07-01), None
patent: 1030237 (2000-08-01), None
patent: 1055989 (2000-11-01), None
patent: 1056014 (2000-11-01), None
patent: 2000-76139 (2000-03-01), None
patent: WO 97/29567 (1997-08-01), None
patent: WO 98/34365 (1998-08-01), None
patent: WO 98/44402 (1998-10-01), None
patent: WO 00/62232 (2000-10-01), None
patent: WO 01/27723 (2001-04-01), None
patent: WO 01/27821 (2001-04-01), None
patent: WO 01/75564 (2001-10-01), None
patent: WO 01/75565 (2001-10-01), None
patent: WO 01/75595 (2001-10-01), None
patent: WO 02/17555 (2002-02-01), None
patent: WO 02/086684 (2002-10-01), None
patent: WO 03/058412 (2003-07-01), None
Berg, Cliff, “How Do I Create a Signed Applet?”, Dr. Dobb's Journal, Aug. 1997, 1-9.
Brands, Stefan, “Restrictive Blinding of Secret-Key Certificates”, CWI, 1995, 1-35, Springer Verlag, Amsterdam, The Netherlands.
Chien, Andrew A. & Byun, Jay H., “Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor”, 7thAnnual IEEE Symposium, FCCM '99 Proceedings, ISBN 0-7695-0375-6, Los Alamitos, CA.
Coulouris, George, Dollimore, Jean, Kindberg, Tim, “Distributed Systems: Concepts and Design”, Queen Mary and Westfield College University of London, 1998, 422-424, 2nded., Addison-Wesley Publishing Ltd., Essex, England.
Crawford, John, “Architecture of the Intel 80386”, IEEE, Jan. 1986, 155-160.
Davida, George I., Desmedt, Yvo G., Matt, Brian J., “Defending Systems Against Viruses through Cryptographic Authentication”, IEEE, Jul. 1989, 312-318.
Fabry, R.S., “Capability-Based Addressing”, Communications of the ACM, Jul. 1974, 403-412, vol. 17, No. 7, Association for Computing Machinery.
Frieder, Dr. Gideon, “The Architecture and Operational Characteristics of the VMX Host Machine”, IEEE, 1982, 9-16.
Goldberg, Robert P., “Survey of Virtual Machine Research”, Computer, Jun. 1974, 34-45, vol. 7, No. 6.
Gong, Li, Mueller, Marianne, Prafullchandra, Hemma, Schemers, Roland, “Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2”, USENIX Symposium on Internet Technologies and Systems, Dec. 1997.
Gum, P. H., “System/370 Extended Architecture: Facilities for Virtual Machines”, IBM J. Res. Develop., Nov. 1983, 530-544, vol. 27, No. 6.
Heinrich, Joe, “MIPS R4000 Microprocessor User's Manual”, 61-97, 2nded.
Hewlett-Packard Company, “Mobile Security Overview”, Sep. 2002, 1-9.
IBM Corporation, “IBM ThinkPad T30 notebooks”, IBM, Apr. 2002, USA.
IBM Corporation, “Information Display Technique for a Terminate Stay”, IBM Technical Disclosure Bulletin, Dec. 1991, 156-158, vol. 34, No. 7A, USA.
Intel Corporation, “IA-32 Intel Architecture Software Developer's Manual—vol. 3: System Programming Guide”, 2003.
Intel Corporation, “IA-64 System Abstraction Layer Specification”, Jan. 2000, pp. 1-1 to 3-21.
Intel Corporation, “Intel 82802AB/82802AC Firmware Hub (FWH)”, Nov. 2000, 17-28.
Intel Corporation, “Intel386 DX Microprocessor 42-BIT CHMOS Microprocessor with Integrated Memory Management”, Dec. 1995.
Karger, et al., “A VMM Security Kernel for the VAX Architecture”, IEEE May 1990, 2-19.
Kashiwagi, Kazuhiko, Saisho, Keizo, Fukuda, Akira, “Design and Implementation of Dynamically Reconstructing System Software”, IEEE, Aug. 1996.
Lawton, Kevin P., “Running Multiple Operating Systems Concurrently on an IA32 PC Using Virtualization Techniques”, (last modified Nov. 29, 1999) <http://www.plex86.org/research/paper.txt>.
Luke, Jahn, Bittorie, John W., Cannon, William J., Haldeman, Douglas G., “Replacement Strategy for Aging Avionics Computers”, IEEE AES Systems Magazine, Mar. 1999.
Menezes, Alfred, Van Oorschot, Paul, Vanstone, Scot A., “Handbook of Applied Cryptography”, CRC Press LLC, 1997, 403-405, 475, 506-515, 570, ISBN: 0-8493-8523-7.
Motorola Inc., “M68040 User's Manual”, Motorola, 1990.
Nanba, S., Ohno, N., Kubo, H., Morisue, H., Ohshima, T., Yamagishi, H., “VM/4z ACOS-4 Virual Machine Architecture”, IEEE, 1985, 171-178.
Richt, Stefan, Hamm, Peter, “In-Circuit-Emulator Wird ‘Echtzeittauglich’”, Elektronik, Aug. 6, 1991, 100-103, No. 16, Munich, Germany.
Robin, John Scott, Irvine, Cynthia E., “Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor”, 9thUSENIX Security Syposium, Denver, Colorado, Aug. 14-17, 2000.
Rosenblum, Mendel, “VMware's Virtual Platform: A Virtual Machine Monitor for Commodity PCs”, Hot Chips 11 conference, Palo Alto, CA, Aug. 15-17, 1999.
RSA Security Inc., “Hardware Authenticators”, (2004) <http://www.rsasecurity.com
ode.asp?id-1158>.
RSA Security Inc., “RSA SecurlD Authenticators: The gold standard in two-factor user authentication”, 2003, SID DS 0103.
RSA Security Inc., “Software Authenticators”, (2004) <http://www.rsasecurity.com
ode.asp?id-1313>.
Saez, Sergio, Vila, Joan, Crespo, Alfons, Garcia, Angel, “A Hardware Scheduler for Complex Real-Time Systems”, IEEE, Apr. 1999, 43-48, ISIE;99—Bled, Slovenia.
Schneier, Bruce, “Applied Croptography”, 1996, 28-33, 47-52, 56-65, 176, 177, 169-187, 216, 217, 461-473, 518-522, 2nded., ISBN 0-471-12845-7, John Wiley & Sons.
Sherwood, Timothy, Calder, Brad, “Patchable Instruction ROM Architecture”, CASES'01, Nov. 16-17, 2001, Atlanta, GA, 24-33.
Trusted Computing Platform Alliance (TCPA), “Main Specification Version 1.1a”, Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, Dec. 1, 2001, 1-321.
Trusted Computing Platform Alliance (TCPA), “Main Specification Version 1.0”, Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, Jan. 25, 2001, 123-227.

No affiliations

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for secure execution using a secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for secure execution using a secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for secure execution using a secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3602780

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.