Information security – Protection of hardware
Reexamination Certificate
2005-11-28
2010-11-30
Pyzocha, Michael (Department: 2437)
Information security
Protection of hardware
C713S176000
Reexamination Certificate
active
07845016
ABSTRACT:
A technique verifies a that a module is from an approved vendor. The technique involves obtaining vendor data and a first magic code from a module (e.g., a small form factor pluggable component), and generating a second magic code based on the vendor data. The technique further involves outputting (i) a magic code valid signal when the second magic code matches the first magic code, and (ii) a magic code invalid signal when the second magic code does not match the first magic code. Operation of a computerized device having the module can be based on the valid and invalid signals (e.g., a voltage level, a bit that is set or cleared, a value in a register, etc.). For example, a supplier of the electronic device can configure software running on the computerized device to disable the module if the first and second magic codes do not match.
REFERENCES:
patent: 5268963 (1993-12-01), Monroe et al.
patent: 5434870 (1995-07-01), Benton et al.
patent: 5781723 (1998-07-01), Yee et al.
patent: 5933503 (1999-08-01), Schell et al.
patent: 6073118 (2000-06-01), Gormish et al.
patent: 6137805 (2000-10-01), Berstis
patent: 6192420 (2001-02-01), Tsai et al.
patent: 6220873 (2001-04-01), Samela et al.
patent: 6285990 (2001-09-01), Lee et al.
patent: 6484128 (2002-11-01), Sekiya et al.
patent: 6546487 (2003-04-01), McManis
patent: 6571335 (2003-05-01), O'Donnell et al.
patent: 6615350 (2003-09-01), Schell et al.
patent: 6629061 (2003-09-01), Shaffer
patent: 6816968 (2004-11-01), Walmsley
patent: 7234061 (2007-06-01), Diab et al.
patent: 7272728 (2007-09-01), Pierson et al.
patent: 7366551 (2008-04-01), Hartley
patent: 7394997 (2008-07-01), Mei et al.
patent: 7502942 (2009-03-01), Mahmoud
patent: 2003/0004887 (2003-01-01), Roszak
patent: 2003/0037239 (2003-02-01), Leung et al.
patent: 2003/0200149 (2003-10-01), Gonzalez et al.
patent: 2003/0236998 (2003-12-01), Gilstrap et al.
patent: 2004/0031030 (2004-02-01), Kidder et al.
patent: 2004/0044631 (2004-03-01), Walker et al.
patent: 2005/0073389 (2005-04-01), Chandley
patent: 2005/0114880 (2005-05-01), Gould
patent: 2005/0201380 (2005-09-01), Saleh et al.
patent: 2005/0278438 (2005-12-01), Sandaire
patent: 2006/0101517 (2006-05-01), Banzhof et al.
patent: 2006/0251253 (2006-11-01), Kappler et al.
patent: 2006/0265742 (2006-11-01), Rommelmann et al.
patent: 2007/0083916 (2007-04-01), Coyle
Menezes, Alfred J., et al. Handbook of Applied Cryptography. CRC Press. Washington, DC, 1997. p. 363.
Computer Hope. Definition of“Serial Number.” 1998-2006. www.computerhope.com/jargon/s/serinumb.htm.
Diab Wael William
Sadana Anshul
BainwoodHuang
Cisco Technology Inc.
Pyzocha Michael
LandOfFree
Methods and apparatus for verifying modules from approved... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for verifying modules from approved..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for verifying modules from approved... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4252102