Method and apparatus for secure execution using a secure...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C711S152000

Reexamination Certificate

active

07822979

ABSTRACT:
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor also contains cryptographic logic coupled to the execution unit that encrypts and decrypts secure data and code.

REFERENCES:
patent: 4573119 (1986-02-01), Westheimer et al.
patent: 5029206 (1991-07-01), Marino et al.
patent: 5065429 (1991-11-01), Lang
patent: 5249232 (1993-09-01), Erbes et al.
patent: 5471599 (1995-11-01), Brodnax et al.
patent: 5841869 (1998-11-01), Merkling et al.
patent: 5982887 (1999-11-01), Hirotani
patent: 6012141 (2000-01-01), Isaman
patent: 6029247 (2000-02-01), Ferguson
patent: 6052780 (2000-04-01), Glover
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6651171 (2003-11-01), England et al.
patent: 6711675 (2004-03-01), Spiegel et al.
patent: 6971022 (2005-11-01), Katta et al.
patent: 2005/0166069 (2005-07-01), Hashimoto et al.
patent: 42 17444.9 (1992-12-01), None
patent: 91111894.1 (1992-03-01), None
patent: 92120421.0 (1994-06-01), None
patent: 98305646.6 (1999-01-01), None
patent: 98310592.2 (1999-07-01), None
patent: 965903 (1999-12-01), None
patent: 99301100.6 (2000-08-01), None
patent: 99304162.3 (2000-11-01), None
patent: 99304164.9 (2000-11-01), None
patent: 1483282 (1977-08-01), None
patent: 10-243380 (2000-03-01), None
patent: WO 97/29567 (1997-08-01), None
patent: WO 98/34365 (1998-08-01), None
patent: WO 98/44402 (1998-10-01), None
patent: WO 00/62232 (2000-10-01), None
patent: WO 01/27723 (2001-04-01), None
patent: WO 01/27821 (2001-04-01), None
patent: WO 01/75564 (2001-10-01), None
patent: WO 01/75565 (2001-10-01), None
patent: WO 01/75595 (2001-10-01), None
patent: WO 02/17555 (2002-02-01), None
patent: WO 02/086684 (2002-10-01), None
patent: WO 03/058412 (2003-07-01), None
Berg, Cliff, “How Do I Create a Signed Applet?”, Dr. Dobb's Journal, Aug. 1997, 1-9.
Brands, Stefan, “Restrictive Blinding of Secret-Key Certificates”, CWI, 1995, 1-35, Springer Verlag, Amsterdam, The Netherlands.
Chien, Andrew A. & Byun, Jay H., “Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor”, 7thAnnual IEEE Symposium, FCCM '99 Proceedings, ISBN 0-7695-0375-6, Los Alamitos, CA.
Trusted Computing Platform Alliance (TCPA), “Main Specification Version 1.1 a”, Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, Dec. 1, 2001, 1-321.
Coulouris, George, Dollimore, Jean, Kindberg, Tim, “Distributed Systems: Concepts and Design”, Queen Mary and Westfield College University of London, 1998, 422-424, 2nded., Addison-Wesley Publishing Ltd., Essex, England.
Davida, George I., Desmedt, Yvo G., Matt, Brian J., “Defending Systems Against Viruses through Cryptographic Authentication”, IEEE, Jul. 1989, 312-318.
Fabry, R.S., “Capability-Based Addressing”, Communications of the ACM, Jul. 1974, 403-412, vol. 17, No. 7, Association for Computing Machinery.
Frieder, Dr. Gideon, “The Architecture and Operational Characteristics of the VMX Host Machine”, IEEE, 1982, 9-16.
Goldberg, Robert P., “Survey of Virtual Machine Research”, Computer, Jun. 1974, 34-45, vol. 7, No. 6.
Gong, Li, Mueller, Marianne, Prafullchandra, Hemma, Schemers, Roland, “Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2”, USENIX Symposium on Internet Technologies and Systems, Dec. 1997.
Gum, P. H., “System/370 Extended Architecture: Facilities for Virtual Machines”, IBM J. Res. Develop., Nov. 1983, 530-544, vol. 27, No. 6.
Heinrich, Joe, “MIPS R4000 Microprocessor User's Manual”, 61-97, 2nded.
Hewlett-Packard Company, “Mobile Security Overview”, Sep. 2002, 1-9.
IBM Corporation, “Information Display Technique for a Terminate Stay”, IBM Technical Disclosure Bulletin, Dec. 1991, 156-158, vol. 34, No. 7A, USA.
IBM Corporation, “IBM ThinkPad T30 notebooks”, IBM, Apr. 2002, USA.
Intel Corporation, “IA-32 Intel Architecture Software Developer's Manual—Volume 3: System Programming Guide”, 2003.
Intel Corporation, “Intel386 DX Microprocessor 42-Bit CHMOS Microprocessor with Integrated Memory Management”, Dec. 1995.
Intel Corporation, “Intel 82802AB/82802AC Firmware Hub (FWH)”, Nov. 2000, 17-28.
Intel Corporation, “IA-64 System Abstraction Layer Specification”, Jan. 2000, pp. 1-1 to 3-21.
Crawford, John, “Architecture of the Intel 80386”, IEEE, Jan. 1986, 155-160.
Karger, et al., “A VMM Security Kernel for the VAX Architecture”, IEEE May 1990, 2-19.
Kashiwagi, Kazuhiko, Saisho, Keizo, Fukuda, Akira, “Design and Implementation of Dynamically Reconstructing System Software”, IEEE, Aug. 1996.
Lawton, Kevin P., “Running Multiple Operating Systems Concurrently on an IA32 PC Using Virtualization Techniques”, (last modified Nov. 29, 1999) <http://www.plex86.org/research/paper.txt>.
Luke, Jahn, Bittorie, John W., Cannon, William J., Haldeman, Douglas G., “Replacement Strategy for Aging Avionics Computers”, IEEE AES Systems Magazine, Mar. 1999.
Menezes, Alfred, Van Oorschot, Paul, Vanstone, Scot A., “Handbook of Applied Cryptography”, CRC Press LLC, 1997, 403-405, 475, 506-515, 570, ISBN: 0-8493-8523-7.
Motorola Inc., “M68040 User's Manual”, Motorola, 1990.
Nanba, S., Ohno, N., Kubo, H., Morisue, H., Ohshima, T., Yamagishi, “VM/4z ACOS-4 Virual Machine Architecture”, IEEE, 1985, 171-178.
Richt, Stefan, Hamm, Peter, “In-Circuit-Emulator Wird ‘Echtzeittauglich’”, Elektronik, Aug. 6, 1991, 100-103, No. 16, Munich, Germany.
Robin, John Scott, Irvine, Cynthia E., “Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor”, 9thUSENIX Security Syposium, Denver, Colorado, Aug. 14-17, 2000.
Rosenblum, Mendel, “VMware's Virtual Platform: A Virtual Machine Monitor for Commodity PCs”, Hot Chips 11 conference, Palo Alto, CA, Aug. 15-17, 1999.
RSA Security Inc., “Hardware Authenticators”, (2004) <http://www.rsasecurity.com
ode.asp?id-1158>.
RSA Security Inc., “RSA SecurID Authenticators: The gold standard in two-factor user authentication”, 2003, SID DS 0103.
RSA Security Inc., “Software Authenticators”, (2004) <http://www.rsasecurity.com
ode.asp?id-1313>.
Saez, Sergio, Vila, Joan, Crespo, Alfons, Garcia, Angel, “A Hardware Scheduler for Complex Real-Time Systems”, IEEE, Apr. 1999, 43-48, ISIE;99-Bled, Slovenia.
Sherwood, Timothy, Calder, Brad, “Patchable Instruction ROM Architecture”, CASES'01, Nov. 16-17, 2001, Atlanta, GA, 24-33.
Trusted Computing Platform Alliance (TCPA), “Main Specification Version 1.0”, Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, Jan. 25, 2001, 123-227.
Schneier, Bruce, “Applied Croptography”, 1996, 28-33, 47-52, 56-65,176, 177, 169-187, 216, 217, 461-473, 518-522, 2nded., ISBN 0-471-12845-7, John Wiley & Sons.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for secure execution using a secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for secure execution using a secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for secure execution using a secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4239341

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.