Method and system for execution monitor-based trusted computing

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000, C713S156000, C713S164000, C713S165000, C713S166000, C713S167000, C713S168000, C711S152000

Reexamination Certificate

active

07930733

ABSTRACT:
A system and method of providing trusted service transactions includes associating a commitment with a remote service. The commitment includes a trusted list of runtime dependencies to execute a transaction. The method includes monitoring an actual list of runtime dependencies invoked during execution of the transaction using a trusted monitor. Execution is blocked if a deviation of the actual list from the trusted list is detected. Therefore, a completed transaction is allowed only if no deviation is found between the trusted and invoked list of runtime dependencies. A certificate authority in cooperation with software vendors preferably provide a signed commitment. The commitment is delivered by the provider to a user upon request and verified by the requester. The transaction is then executed by the user. Therefore, trust is verified before and during the transaction and privacy of data is guaranteed after completion.

REFERENCES:
patent: 5649099 (1997-07-01), Theimer et al.
patent: 6263442 (2001-07-01), Mueller et al.
patent: 6351810 (2002-02-01), Gupta
patent: 6351816 (2002-02-01), Mueller et al.
patent: 7194634 (2007-03-01), Ellison et al.
patent: 7594111 (2009-09-01), Kiriansky et al.
patent: 2005/0149729 (2005-07-01), Zimmer et al.
patent: 2006/0123227 (2006-06-01), Miller et al.
patent: 2007/0011723 (2007-01-01), Chao
patent: 2008/0141024 (2008-06-01), Ranganathan
patent: 2008/0276086 (2008-11-01), Proudler
Shi, et al., “BIND: A Fine-grained Attestation Service for Secure Distributed Systems,”Proceedings of IEEE Symposium on Security and Privacy(1995).
Garfinkel, et al., “Terra: A Virtual Machine-Based Platform for Trusted Computing,”Proceedings of the 19thACM SOSP '03, Bolton Landing, New York (Oct. 19-22, 2003).
Arbaugh, et al., “A Secure and Reliable Bootstrap Architecture,”Proceedings of IEEE Symposium on Security and Privacy, pp. 65-71 (1997).
Sailer, et al., “Design and Implementation of a TCG-based Integrity Measurement Architecture,”Proceedings of 13thUSENIX Security Symposium(Jan. 16, 2004).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for execution monitor-based trusted computing does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for execution monitor-based trusted computing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for execution monitor-based trusted computing will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2702274

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.