Methods and systems for promoting security in a computer...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000

Reexamination Certificate

active

07036020

ABSTRACT:
The present methods and systems use specially isolated techniques for promoting security in a computer system. In one embodiment of these methods and systems, a simple file system is concealed in the storage of the computer system and is managed with a processor and simple non-writeable code operating on the storage device. Strong cryptographic design permits the present computer security methods and systems to secure data on the storage device. In one method embodiment, a computer system is provided with an operating system in operative association with at least one storage device, wherein the storage device includes firmware and a processor for processing data and instructions stored on the storage device. The method includes creating at least one security partition in, and restricting access to, at least a portion of the storage device by the operating system. The method also includes creating at least one security partition in the storage device. The method also includes providing at least one authority record and data associated with the authority record in the storage device. System and computer-readable medium embodiments structured in accordance with the method embodiments discussed herein are also provided.

REFERENCES:
patent: 3576544 (1971-04-01), Cordero, Jr. et al.
patent: 3890601 (1975-06-01), Pietrolewicz
patent: 4183085 (1980-01-01), Roberts et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 5022077 (1991-06-01), Bealkowski et al.
patent: 5027401 (1991-06-01), Soltesz
patent: 5101374 (1992-03-01), Sinutko, Jr.
patent: 5345590 (1994-09-01), Ault et al.
patent: 5394469 (1995-02-01), Nagel et al.
patent: 5432939 (1995-07-01), Blackledge et al.
patent: 5448045 (1995-09-01), Clark
patent: 5504814 (1996-04-01), Miyahara
patent: 5623637 (1997-04-01), Jones et al.
patent: 5754821 (1998-05-01), Cripe et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5892902 (1999-04-01), Clark
patent: 5928364 (1999-07-01), Yamamoto
patent: 5940513 (1999-08-01), Aucsmith et al.
patent: 5949601 (1999-09-01), Braithwaite et al.
patent: 6044349 (2000-03-01), Tolopka et al.
patent: 6092202 (2000-07-01), Veil et al.
patent: 6134662 (2000-10-01), Levy et al.
patent: 6138239 (2000-10-01), Veil
patent: 6141752 (2000-10-01), Dancs et al.
patent: 6173402 (2001-01-01), Chapman
patent: 6175924 (2001-01-01), Arnold
patent: 6182222 (2001-01-01), Oparaji
patent: 6192472 (2001-02-01), Garay et al.
patent: 6219726 (2001-04-01), Ripberger
patent: 6219771 (2001-04-01), Kikuchi et al.
patent: 6253281 (2001-06-01), Hall
patent: 6268789 (2001-07-01), Diamant et al.
patent: 6321358 (2001-11-01), Anderson
patent: 6324627 (2001-11-01), Kricheff et al.
patent: 6336187 (2002-01-01), Kern et al.
patent: 6360945 (2002-03-01), Drew
patent: 6446209 (2002-09-01), Kern et al.
patent: 6691198 (2004-02-01), Hamlin
patent: 2002/0077177 (2002-06-01), Elliott
patent: 2002/0136406 (2002-09-01), Fitzhardinge et al.
patent: 2002/0157010 (2002-10-01), Dayan et al.
patent: 0 965 903 (1999-12-01), None
patent: 5134863 (1993-06-01), None
patent: 8115266 (1996-05-01), None
patent: WO 99/59049 (1999-11-01), None
“TCPA PC Specific Implementation Specification,” Version 1.00, Sep. 9, 2001.
Gobioff, H. et al., “Security for Network Attached Storage Devices,” School of Computer Science, Carnegie Mellon University, Oct. 23, 1997.
Strunk, J. D. et al. “Self-Security Storage: Protecting Data in Compromised Systems,” 4thSymposium on Operating Systems Design and Implementation, Oct. 2000.
“Trusted Computing Platform Alliance (TCPA),” Main Specification Version 1.1a, Nov. 12, 2001.
“Intel® Protected Access Architecture,” Application Interface Specification, Revision 1.0, Mar. 2001.
“Research on a Dedicated CPU Architecture for Java IC Card”, Wang Tao, et al., Acta Electronica Sinica, vol. 28, No. 11, Nov. 2000, pp. 77-80, 76., Chinese Inst. Electron, China, Abstract.
“Smart Cards With Built-in Microprocessors: Partition into Virtual Cards”, R. Brenner, ELEKTRONIK; vol. 43, No. 9, May 3, 1994, pp. 38-44, Germany, Abstract.
“Public Protection of Software”, ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393.
“Protection and Control of Information Sharing in Multics”, Communications of the ACM, vol. 17, No. 7, Jul. 1974.
“Hardware Support for Memory Protection: Capability Implementations”, M.V. Wilkes, Digital Equipment Corporation.
“SECUR'ACCes: access control with the CP8 smart card”, Securicom 87: 5th Worldwide Congresson Computer and Communications Security and Protection. SEDEP, 1987, pp. 187-196, Paris, France, Abstract.
“Memory Protection Software Facility for OS/2 Shared Data Applica-tions”, IBM Technical Disclosure Bulletin, pp. 81-89, Sep. 1991.
“Modular System Partition”, IBM Technical Disclosure Bulletin, pp. 341-342, Dec. 1992.
“Password Protection of Separate Hard Disk Partitions”, IBM Technical Disclosure Bulletin, pp. 103-104, Nov. 1996.
“Preventing Access to a Personal Computer”, IBM Technical Disclosure Bulletin, pp. 98-100, Sep. 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for promoting security in a computer... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for promoting security in a computer..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for promoting security in a computer... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3587562

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.