Cryptography – Key management
Reexamination Certificate
2007-09-27
2011-11-22
Gergiso, Techane (Department: 2437)
Cryptography
Key management
C713S164000
Reexamination Certificate
active
08064605
ABSTRACT:
A processing system with a trusted platform module (TPM) supports migration of digital keys. For instance, an application in the processing system may create a first configuration key as a child of a TPM storage root key (SRK) when the processing system has a first configuration. The application may also create an upgradable root user key associated with an upgrade authority as a child of the first configuration key. The application may also create a user key as a child of the upgradable root user key. When the processing system has a second configuration, the application may create a second configuration key as a child of the SRK. The application may request migration approval from the upgrade authority. In response to receiving the approval from the upgrade authority, the application may migrate the root user key to be a child of the second configuration key. Other embodiments are described and claimed.
REFERENCES:
patent: 6813703 (2004-11-01), Nishikawa et al.
patent: 6895501 (2005-05-01), Salowey
patent: 6922774 (2005-07-01), Meushaw et al.
patent: 7058807 (2006-06-01), Grawrock et al.
patent: 7076655 (2006-07-01), Griffin et al.
patent: 7177967 (2007-02-01), Jeyasingh et al.
patent: 7222062 (2007-05-01), Goud et al.
patent: 7380119 (2008-05-01), Bade et al.
patent: 7454544 (2008-11-01), Bond et al.
patent: 7478233 (2009-01-01), Olson et al.
patent: 7512815 (2009-03-01), Munetoh
patent: 7552419 (2009-06-01), Zimmer et al.
patent: 7590867 (2009-09-01), Scarlata et al.
patent: 2002/0059286 (2002-05-01), Challener
patent: 2002/0169717 (2002-11-01), Challener
patent: 2002/0193615 (2002-12-01), Aksela et al.
patent: 2002/0194482 (2002-12-01), Griffin et al.
patent: 2003/0023776 (2003-01-01), Kolinummi et al.
patent: 2003/0097578 (2003-05-01), England et al.
patent: 2003/0115453 (2003-06-01), Grawrock
patent: 2003/0115468 (2003-06-01), Aull et al.
patent: 2003/0133575 (2003-07-01), Challener
patent: 2003/0226031 (2003-12-01), Proudler et al.
patent: 2003/0229485 (2003-12-01), Nishikawa et al.
patent: 2004/0031030 (2004-02-01), Kidder et al.
patent: 2004/0151319 (2004-08-01), Proudler
patent: 2004/0264797 (2004-12-01), Lippincott et al.
patent: 2005/0021968 (2005-01-01), Zimmer et al.
patent: 2005/0086509 (2005-04-01), Ranganathan
patent: 2005/0120219 (2005-06-01), Munetoh et al.
patent: 2005/0130611 (2005-06-01), Lu et al.
patent: 2005/0132122 (2005-06-01), Rozas
patent: 2005/0133582 (2005-06-01), Bajikar
patent: 2005/0138370 (2005-06-01), Goud et al.
patent: 2005/0144440 (2005-06-01), Catherman et al.
patent: 2005/0166024 (2005-07-01), Angelo et al.
patent: 2005/0235141 (2005-10-01), Ibrahim et al.
patent: 2005/0246552 (2005-11-01), Bade et al.
patent: 2005/0286792 (2005-12-01), Mehta et al.
patent: 2006/0002471 (2006-01-01), Lippincott et al.
patent: 2006/0015718 (2006-01-01), Liu et al.
patent: 2006/0020781 (2006-01-01), Rozas et al.
patent: 2006/0026422 (2006-02-01), Bade et al.
patent: 2006/0031436 (2006-02-01), Sakata et al.
patent: 2006/0075223 (2006-04-01), Bade et al.
patent: 2006/0140501 (2006-06-01), Tadas
patent: 2006/0190986 (2006-08-01), Mont et al.
patent: 2006/0212939 (2006-09-01), England et al.
patent: 2006/0230401 (2006-10-01), Grawrock
patent: 2006/0256105 (2006-11-01), Scarlata
patent: 2006/0256107 (2006-11-01), Scarlata
patent: 2006/0256108 (2006-11-01), Scarlata
patent: 2007/0003064 (2007-01-01), Wiseman et al.
patent: 2007/0016766 (2007-01-01), Richmond et al.
patent: 2007/0043896 (2007-02-01), Daruwala et al.
patent: 2007/0094719 (2007-04-01), Scarlata
patent: 2007/0130472 (2007-06-01), Buer et al.
patent: 2007/0149554 (2007-06-01), Rozas et al.
patent: 2007/0168048 (2007-07-01), Allen et al.
patent: 2007/0226496 (2007-09-01), Maletsky et al.
patent: 2007/0226786 (2007-09-01), Berger et al.
patent: 2007/0256125 (2007-11-01), Chen
patent: 2007/0300069 (2007-12-01), Rozas
patent: 2008/0059799 (2008-03-01), Scarlata
patent: 2009/0169012 (2009-07-01), Smith et al.
patent: 2009/0271618 (2009-10-01), Camenisch et al.
patent: WO 02/06929 (2002-01-01), None
Intellectual Property Office of Great Britain, Combined Search and Examination Report Under Sections 17 and 18(3), Dated Dec. 19, 2008, in a related application.
Chinese Patent and Trademark Office, First Office Action dated Jun. 8, 2010 in Chinese patent application No. 200810188778.4.
Nancy Sumrall, et al., “Trusted Computing Group (TCG) and the TPM 1.2 Specification”, Intel Developer Forum, pp. 1-32, Sep. 2003.
Charles Scott Powell, “Foundations for Trusted Computing, Net Project”, Nov. 7, 2002, London, England, pp. 1-87.
“Trusted Computing Platform Alliance (TCPA) Main Specification Version 1.1 b”, Trusted Computing Group, Inc. 2003, pp. 1-332.
“TPM Main Part 1 Design Principles, Specification Version 1.2 Revision 62”, Trusted Computing Group, Oct. 2, 2003, pp. 1-161.
Mario Strasser, “A Software-Based TPM Emulator for Linux”,Semester Thesis, Department of Computer Science, Jul. 2004. pp. 1-56, Zurich, Switzerland.
Tal Garfinkle, et al. “Terra: A Virtual Machine-Based Platform for Trusted Computing”, Computer Science Department, Stanford University, Oct. 19, 2003, pp. 1-14.
PCT International Search Report for Application No. PCT/US2005/019724, filed Jun. 3, 2005, mailed Sep. 5, 2005.
Vincent Scarlata, Method and Apparatus for Remotely Provisioning Software-Based Security Coprocessors, U.S. Appl. No. 11/171,880, filed Jun. 29, 2005.
Vincent Scarlata, Method and Apparatus for Generating Endorsement Credentials for Software-Based Security Coprocessors, U.S. Appl. No. 11/171,856, filed Jun. 29, 2005.
Vincent Scarlata, Method and Apparatus for Providing Software-Based Security Coprocessors, U.S. Appl. No. 11/171,133, filed Jun. 29, 2005.
“What is Trusted Grub?”, Applied Data Security Group, http://www.prosec.rub.de/trusted—grub.html.
VMWARE Inc., “VMware Reinvents Enterprise Desktop Management and Security with Breakthrough New Product”, Sep. 20, 2004, http://www.wmware.com
ew/releases/ace—announce.html.
Barham et al., “Xen and the Art of Virtualization”, University of Cambridge Computer Laboratory, pp. 14, 2003. Last accessed Jan. 29, 2008, http://www.cl.cam.ac.uk/Research/SRG
etos/papers/2003-xensosp.pdf.
George W. Dunlap, et al. “ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay”, Proceedings of the 2002 Symposium on Operating Systems Design and Implementation, pp. 1-14, http://www.eecs.umich.edu/CoVirt/papers/revirt.pdf.
Joan G. Dyer et al., “Building the IBM 4758 Secure Processor”, Oct. 2001, pp. 1-10, http://ieeexplore.org/iel5/20660/00955100.pdf?arnumber=955100.
Fraser et al., “Safe Hardware Access with the Xen Virtual Machine Monitor”, University of Cambridge Computer Laboratory, pp. 10. Last accessed Jan. 29, 2008, http://www.cl.cam.ac.uk/Research/SRG
etos/papers/2004-oasis-ngio.pdf.
Garfinkle et al., “Terra: A Virtual Machine-Based Platform for Trusted Computing”, (presentation), Nov. 10, 2004, p. 23. Last accessed on Jan. 29, 2008, http://www.cs.utexas.edu/˜shmat/courses/cs395t—fall04/rager.pdf.
The Trusted Computing Group, “What is the Trusted Computing Group?” (Internet home page) 2005, http://www.trustedcomputinggroup.org/home.
John Marchensini, et al., “Experimenting with TCPA/TCG Hardware”, Computer Science Technical Report TR2003-476, Dec. 15, 2003, pp. 1-20, http://www.cs.dartmouth.edu/˜sws/papers/mswm03.pdf.
Meushaw et al., “NetTop: Commercial Technology in High Assurance Applications”, Tech Trend Notes, vol. 9, ed. 4, Research and Advanced Technology Publication, Fall 2000, pp. 9. Last accessed on Jan. 29, 2008, http://www.vmware.com/pdf/TechTrendNotes.pdf.
David Afford “The Need for TCPA”, IBM Research, Oct. 2002, pp. 7. Last Accessed Jan. 29, 2008, http://www.research.ibm.com/gsal/tcpa/why—tcpa.pdf.
Sailer et al., “Design and Implementation of a TCG-based Integrity Measurement
Brutch Tasneem
Kumar Alok
Scarlata Vincent R.
Siddiqi Faraz A.
Smith Ned M.
Gergiso Techane
Intel Corporation
Trop Pruner & Hu P.C.
LandOfFree
Methods and apparatus for providing upgradeable key bindings... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for providing upgradeable key bindings..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for providing upgradeable key bindings... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4311235