Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2006-11-28
2006-11-28
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C713S150000, C713S168000
Reexamination Certificate
active
07143287
ABSTRACT:
A method and system for verifying binding of an initial trusted device to a secured processing system binds an initial device or replacement when no binding information is available from another device in the system. A platform credential is issued only when a valid binding is verified, by sending a proof of binding to a credential provider, such as the manufacturer. The method secures against security breaches that can occur when a device is removed from the system during the binding process. The binding information is generated in the device upon installation and includes system identification information so that at each initialization, upon return of binding information from the system to the device, the device can ensure that it is installed in the proper system and abort operation if the system does not match.
REFERENCES:
patent: 2003/0056109 (2003-03-01), Elliot et al.
patent: 2003/0115453 (2003-06-01), Grawrok
patent: 2003/0188162 (2003-10-01), Candelore et al.
patent: 2003/0226040 (2003-12-01), Challener et al.
patent: 1076279 (2001-02-01), None
patent: WO014/52234 (2001-07-01), None
Allocation and binding during fault-secure microarchitecture synthesis; Sokolov, S.; Karri, R.; Computer Design: VLSI in Computers and Processors, 1994. ICCD '94. Proceedings., IEEE International Conference on Oct. 10-12, 1994 pp. 327-330.
Local key exchange for mobile IPv6 local binding security association; Changwen Liu; Soliman, H.; Vehicular Technology Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th vol. 5, May 17-19, 2004 pp. 2647-2655 vol. 5.
Composition trust bindings in pervasive computing service composition; Buford, J.; Kumar, R.; Perkins, G.; Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on; Mar. 13-17, 2006 p. 6 pp.
U.S. Appl. No. 10/835,503, filed Apr. 29, 2004, Bade et al.
U.S. Appl. No. 10/835,498, filed Apr. 29, 2004, Bade et al.
U.S. Appl. No. 10/835,350, filed Apr. 29, 2004, Bade et al.
U.S. Appl. No. 10/835,330, filed Apr. 29, 2004, Bade et al.
Puttegowda, et al., “RSA encryption using extended modular arithmetic on the Quicksilver COSM adaptive computing machine”, Field-Programmable Custom Computing Machines, 2003. FCCM 2003. 11th Annual IEEE Symposium on Apr. 9-11, 2003, pp. 305-307.
Al-Muhtadi, et al. “Context and Location-Aware Encyption for Pervasive Computing Environments”, Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on Mar. 13-17, 2006 pp. 289-289.
Chew, et al. “IAuth: An authentication system for internet applications”, Computer Software and Applications Conference, 1997, COMPSAC '97 Proceedings, The Twenty-First Annual International Aug. 13-15, 1997, pp. 654-659.
Bade Steven A.
Challener David Carroll
Harris Andrew M.
Harris, Atty at Law, LLC Mitch
International Business Machines - Corporation
Jung David
Salys Casimer K.
LandOfFree
Method and system for verifying binding of an initial... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for verifying binding of an initial..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for verifying binding of an initial... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3699088