Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2005-09-20
2010-10-26
Barron, Jr., Gilberto (Department: 2432)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C711S152000
Reexamination Certificate
active
07822979
ABSTRACT:
A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor also contains cryptographic logic coupled to the execution unit that encrypts and decrypts secure data and code.
REFERENCES:
patent: 4573119 (1986-02-01), Westheimer et al.
patent: 5029206 (1991-07-01), Marino et al.
patent: 5065429 (1991-11-01), Lang
patent: 5249232 (1993-09-01), Erbes et al.
patent: 5471599 (1995-11-01), Brodnax et al.
patent: 5841869 (1998-11-01), Merkling et al.
patent: 5982887 (1999-11-01), Hirotani
patent: 6012141 (2000-01-01), Isaman
patent: 6029247 (2000-02-01), Ferguson
patent: 6052780 (2000-04-01), Glover
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6651171 (2003-11-01), England et al.
patent: 6711675 (2004-03-01), Spiegel et al.
patent: 6971022 (2005-11-01), Katta et al.
patent: 2005/0166069 (2005-07-01), Hashimoto et al.
patent: 42 17444.9 (1992-12-01), None
patent: 91111894.1 (1992-03-01), None
patent: 92120421.0 (1994-06-01), None
patent: 98305646.6 (1999-01-01), None
patent: 98310592.2 (1999-07-01), None
patent: 965903 (1999-12-01), None
patent: 99301100.6 (2000-08-01), None
patent: 99304162.3 (2000-11-01), None
patent: 99304164.9 (2000-11-01), None
patent: 1483282 (1977-08-01), None
patent: 10-243380 (2000-03-01), None
patent: WO 97/29567 (1997-08-01), None
patent: WO 98/34365 (1998-08-01), None
patent: WO 98/44402 (1998-10-01), None
patent: WO 00/62232 (2000-10-01), None
patent: WO 01/27723 (2001-04-01), None
patent: WO 01/27821 (2001-04-01), None
patent: WO 01/75564 (2001-10-01), None
patent: WO 01/75565 (2001-10-01), None
patent: WO 01/75595 (2001-10-01), None
patent: WO 02/17555 (2002-02-01), None
patent: WO 02/086684 (2002-10-01), None
patent: WO 03/058412 (2003-07-01), None
Berg, Cliff, “How Do I Create a Signed Applet?”, Dr. Dobb's Journal, Aug. 1997, 1-9.
Brands, Stefan, “Restrictive Blinding of Secret-Key Certificates”, CWI, 1995, 1-35, Springer Verlag, Amsterdam, The Netherlands.
Chien, Andrew A. & Byun, Jay H., “Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor”, 7thAnnual IEEE Symposium, FCCM '99 Proceedings, ISBN 0-7695-0375-6, Los Alamitos, CA.
Trusted Computing Platform Alliance (TCPA), “Main Specification Version 1.1 a”, Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, Dec. 1, 2001, 1-321.
Coulouris, George, Dollimore, Jean, Kindberg, Tim, “Distributed Systems: Concepts and Design”, Queen Mary and Westfield College University of London, 1998, 422-424, 2nded., Addison-Wesley Publishing Ltd., Essex, England.
Davida, George I., Desmedt, Yvo G., Matt, Brian J., “Defending Systems Against Viruses through Cryptographic Authentication”, IEEE, Jul. 1989, 312-318.
Fabry, R.S., “Capability-Based Addressing”, Communications of the ACM, Jul. 1974, 403-412, vol. 17, No. 7, Association for Computing Machinery.
Frieder, Dr. Gideon, “The Architecture and Operational Characteristics of the VMX Host Machine”, IEEE, 1982, 9-16.
Goldberg, Robert P., “Survey of Virtual Machine Research”, Computer, Jun. 1974, 34-45, vol. 7, No. 6.
Gong, Li, Mueller, Marianne, Prafullchandra, Hemma, Schemers, Roland, “Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2”, USENIX Symposium on Internet Technologies and Systems, Dec. 1997.
Gum, P. H., “System/370 Extended Architecture: Facilities for Virtual Machines”, IBM J. Res. Develop., Nov. 1983, 530-544, vol. 27, No. 6.
Heinrich, Joe, “MIPS R4000 Microprocessor User's Manual”, 61-97, 2nded.
Hewlett-Packard Company, “Mobile Security Overview”, Sep. 2002, 1-9.
IBM Corporation, “Information Display Technique for a Terminate Stay”, IBM Technical Disclosure Bulletin, Dec. 1991, 156-158, vol. 34, No. 7A, USA.
IBM Corporation, “IBM ThinkPad T30 notebooks”, IBM, Apr. 2002, USA.
Intel Corporation, “IA-32 Intel Architecture Software Developer's Manual—Volume 3: System Programming Guide”, 2003.
Intel Corporation, “Intel386 DX Microprocessor 42-Bit CHMOS Microprocessor with Integrated Memory Management”, Dec. 1995.
Intel Corporation, “Intel 82802AB/82802AC Firmware Hub (FWH)”, Nov. 2000, 17-28.
Intel Corporation, “IA-64 System Abstraction Layer Specification”, Jan. 2000, pp. 1-1 to 3-21.
Crawford, John, “Architecture of the Intel 80386”, IEEE, Jan. 1986, 155-160.
Karger, et al., “A VMM Security Kernel for the VAX Architecture”, IEEE May 1990, 2-19.
Kashiwagi, Kazuhiko, Saisho, Keizo, Fukuda, Akira, “Design and Implementation of Dynamically Reconstructing System Software”, IEEE, Aug. 1996.
Lawton, Kevin P., “Running Multiple Operating Systems Concurrently on an IA32 PC Using Virtualization Techniques”, (last modified Nov. 29, 1999) <http://www.plex86.org/research/paper.txt>.
Luke, Jahn, Bittorie, John W., Cannon, William J., Haldeman, Douglas G., “Replacement Strategy for Aging Avionics Computers”, IEEE AES Systems Magazine, Mar. 1999.
Menezes, Alfred, Van Oorschot, Paul, Vanstone, Scot A., “Handbook of Applied Cryptography”, CRC Press LLC, 1997, 403-405, 475, 506-515, 570, ISBN: 0-8493-8523-7.
Motorola Inc., “M68040 User's Manual”, Motorola, 1990.
Nanba, S., Ohno, N., Kubo, H., Morisue, H., Ohshima, T., Yamagishi, “VM/4z ACOS-4 Virual Machine Architecture”, IEEE, 1985, 171-178.
Richt, Stefan, Hamm, Peter, “In-Circuit-Emulator Wird ‘Echtzeittauglich’”, Elektronik, Aug. 6, 1991, 100-103, No. 16, Munich, Germany.
Robin, John Scott, Irvine, Cynthia E., “Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor”, 9thUSENIX Security Syposium, Denver, Colorado, Aug. 14-17, 2000.
Rosenblum, Mendel, “VMware's Virtual Platform: A Virtual Machine Monitor for Commodity PCs”, Hot Chips 11 conference, Palo Alto, CA, Aug. 15-17, 1999.
RSA Security Inc., “Hardware Authenticators”, (2004) <http://www.rsasecurity.com
ode.asp?id-1158>.
RSA Security Inc., “RSA SecurID Authenticators: The gold standard in two-factor user authentication”, 2003, SID DS 0103.
RSA Security Inc., “Software Authenticators”, (2004) <http://www.rsasecurity.com
ode.asp?id-1313>.
Saez, Sergio, Vila, Joan, Crespo, Alfons, Garcia, Angel, “A Hardware Scheduler for Complex Real-Time Systems”, IEEE, Apr. 1999, 43-48, ISIE;99-Bled, Slovenia.
Sherwood, Timothy, Calder, Brad, “Patchable Instruction ROM Architecture”, CASES'01, Nov. 16-17, 2001, Atlanta, GA, 24-33.
Trusted Computing Platform Alliance (TCPA), “Main Specification Version 1.0”, Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, Jan. 25, 2001, 123-227.
Schneier, Bruce, “Applied Croptography”, 1996, 28-33, 47-52, 56-65,176, 177, 169-187, 216, 217, 461-473, 518-522, 2nded., ISBN 0-471-12845-7, John Wiley & Sons.
Barron Jr. Gilberto
Intel Corporation
Kenyon & Kenyon LLP
Perungavoor Venkat
LandOfFree
Method and apparatus for secure execution using a secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for secure execution using a secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for secure execution using a secure... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4239341