Information security – Access control or authentication – Network
Reexamination Certificate
2011-04-19
2011-04-19
Zand, Kambiz (Department: 2434)
Information security
Access control or authentication
Network
C713S155000, C713S156000, C713S164000, C713S165000, C713S166000, C713S167000, C713S168000, C711S152000
Reexamination Certificate
active
07930733
ABSTRACT:
A system and method of providing trusted service transactions includes associating a commitment with a remote service. The commitment includes a trusted list of runtime dependencies to execute a transaction. The method includes monitoring an actual list of runtime dependencies invoked during execution of the transaction using a trusted monitor. Execution is blocked if a deviation of the actual list from the trusted list is detected. Therefore, a completed transaction is allowed only if no deviation is found between the trusted and invoked list of runtime dependencies. A certificate authority in cooperation with software vendors preferably provide a signed commitment. The commitment is delivered by the provider to a user upon request and verified by the requester. The transaction is then executed by the user. Therefore, trust is verified before and during the transaction and privacy of data is guaranteed after completion.
REFERENCES:
patent: 5649099 (1997-07-01), Theimer et al.
patent: 6263442 (2001-07-01), Mueller et al.
patent: 6351810 (2002-02-01), Gupta
patent: 6351816 (2002-02-01), Mueller et al.
patent: 7194634 (2007-03-01), Ellison et al.
patent: 7594111 (2009-09-01), Kiriansky et al.
patent: 2005/0149729 (2005-07-01), Zimmer et al.
patent: 2006/0123227 (2006-06-01), Miller et al.
patent: 2007/0011723 (2007-01-01), Chao
patent: 2008/0141024 (2008-06-01), Ranganathan
patent: 2008/0276086 (2008-11-01), Proudler
Shi, et al., “BIND: A Fine-grained Attestation Service for Secure Distributed Systems,”Proceedings of IEEE Symposium on Security and Privacy(1995).
Garfinkel, et al., “Terra: A Virtual Machine-Based Platform for Trusted Computing,”Proceedings of the 19thACM SOSP '03, Bolton Landing, New York (Oct. 19-22, 2003).
Arbaugh, et al., “A Secure and Reliable Bootstrap Architecture,”Proceedings of IEEE Symposium on Security and Privacy, pp. 65-71 (1997).
Sailer, et al., “Design and Implementation of a TCG-based Integrity Measurement Architecture,”Proceedings of 13thUSENIX Security Symposium(Jan. 16, 2004).
Iftode Liviu
Xu Gang
AT&T Intellectual Property II L.P.
Hoffmann & Baron , LLP
Rutgers The State University of New Jersey
Tran Tongoc
Zand Kambiz
LandOfFree
Method and system for execution monitor-based trusted computing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for execution monitor-based trusted computing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for execution monitor-based trusted computing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2702274