Method and system for verifying binding of an initial...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S168000

Reexamination Certificate

active

07143287

ABSTRACT:
A method and system for verifying binding of an initial trusted device to a secured processing system binds an initial device or replacement when no binding information is available from another device in the system. A platform credential is issued only when a valid binding is verified, by sending a proof of binding to a credential provider, such as the manufacturer. The method secures against security breaches that can occur when a device is removed from the system during the binding process. The binding information is generated in the device upon installation and includes system identification information so that at each initialization, upon return of binding information from the system to the device, the device can ensure that it is installed in the proper system and abort operation if the system does not match.

REFERENCES:
patent: 2003/0056109 (2003-03-01), Elliot et al.
patent: 2003/0115453 (2003-06-01), Grawrok
patent: 2003/0188162 (2003-10-01), Candelore et al.
patent: 2003/0226040 (2003-12-01), Challener et al.
patent: 1076279 (2001-02-01), None
patent: WO014/52234 (2001-07-01), None
Allocation and binding during fault-secure microarchitecture synthesis; Sokolov, S.; Karri, R.; Computer Design: VLSI in Computers and Processors, 1994. ICCD '94. Proceedings., IEEE International Conference on Oct. 10-12, 1994 pp. 327-330.
Local key exchange for mobile IPv6 local binding security association; Changwen Liu; Soliman, H.; Vehicular Technology Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th vol. 5, May 17-19, 2004 pp. 2647-2655 vol. 5.
Composition trust bindings in pervasive computing service composition; Buford, J.; Kumar, R.; Perkins, G.; Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on; Mar. 13-17, 2006 p. 6 pp.
U.S. Appl. No. 10/835,503, filed Apr. 29, 2004, Bade et al.
U.S. Appl. No. 10/835,498, filed Apr. 29, 2004, Bade et al.
U.S. Appl. No. 10/835,350, filed Apr. 29, 2004, Bade et al.
U.S. Appl. No. 10/835,330, filed Apr. 29, 2004, Bade et al.
Puttegowda, et al., “RSA encryption using extended modular arithmetic on the Quicksilver COSM adaptive computing machine”, Field-Programmable Custom Computing Machines, 2003. FCCM 2003. 11th Annual IEEE Symposium on Apr. 9-11, 2003, pp. 305-307.
Al-Muhtadi, et al. “Context and Location-Aware Encyption for Pervasive Computing Environments”, Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on Mar. 13-17, 2006 pp. 289-289.
Chew, et al. “IAuth: An authentication system for internet applications”, Computer Software and Applications Conference, 1997, COMPSAC '97 Proceedings, The Twenty-First Annual International Aug. 13-15, 1997, pp. 654-659.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for verifying binding of an initial... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for verifying binding of an initial..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for verifying binding of an initial... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3699088

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.