Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-03-22
2005-03-22
Darrow, Justin T. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S152000, C713S161000, C713S164000, C713S189000, C713S152000
Reexamination Certificate
active
06871283
ABSTRACT:
A method for executing trusted commands, in which a trusted command is first received from a user at a user terminal and parsed by untrusted code; then passed to a trusted computing base for execution. The trusted computing base displays some indication of what is to be done back to the user for confirmation. Confirmation of the commands prevents unauthorized modification of the commands and increases system confidence. A randomly (or pseudo-randomly) generated process identifier is employed to verify the existence of a trusted path.
REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4005386 (1977-01-01), Seki et al.
patent: 4183085 (1980-01-01), Roberts et al.
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4253145 (1981-02-01), Goldberg
patent: 4310720 (1982-01-01), Check, Jr.
patent: 4315101 (1982-02-01), Atalla
patent: 4328542 (1982-05-01), Anastas et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4430728 (1984-02-01), Beitel et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4486828 (1984-12-01), Kitamura et al.
patent: 4488217 (1984-12-01), Binder et al.
patent: 4531023 (1985-07-01), Levine
patent: 4584639 (1986-04-01), Hardy
patent: 4593353 (1986-06-01), Pickholtz
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4669043 (1987-05-01), Kaplinsky
patent: 4677546 (1987-06-01), Freeman et al.
patent: 4677670 (1987-06-01), Henderson, Jr.
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4742447 (1988-05-01), Duvall et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4751669 (1988-06-01), Sturgis et al.
patent: 4754326 (1988-06-01), Kram et al.
patent: 4754395 (1988-06-01), Weisshaar et al.
patent: 4771461 (1988-09-01), Matyas
patent: 4794515 (1988-12-01), Hornung
patent: 4797853 (1989-01-01), Savage et al.
patent: 4799061 (1989-01-01), Abraham et al.
patent: 4799153 (1989-01-01), Hann et al.
patent: 4829469 (1989-05-01), Germaine et al.
patent: 4858117 (1989-08-01), DiChiara et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4918653 (1990-04-01), Johri et al.
patent: 4926476 (1990-05-01), Covey
patent: 4945468 (1990-07-01), Carson et al.
patent: 4962533 (1990-10-01), Krueger et al.
patent: 326669 (1989-08-01), None
Dept. of Defense, “Dept. of Defense Trusted Computer System Evaluation Criteria,” Dec. 26, 1985. Retrieved from the Internet:<URL: http://csrc.ncsl.nist.gov/secpubs/rainbow/std001.txt>.*
National Institute of Standards and Technology, “DES Modes of Operation,” Dec. 2, 1980, FIPS PUB 81. Retrieved for the Internet:<http://www.itl.nist.gov/fipspubs/fip81.htm>.
Wiseman, et al.,The Trusted Path between SMITE and the User, IEEE Symposium on Security and Privacyat 147-155 (1988) (published in the U.S.A.).
Ames et al.,Security Kernel Design and Implementation: An Introduction, IEEE Computer, pp. 14-22 (Jul. 1983).
Krager et al.,A VMM Security Kernel for the VAX Architecture, (unpublished draft of Jan. 11, 1990).
Atkins, D.E.,Design of the Arithmetic Units of ILLIAC III: Use of Redundancy and Higher Radix Methods, IE Transactions on Computers, vol. C-19, No. 8, Aug. 1970, pp. 720-733.
Dunford,Filer, Version 2.20 User Documentation, (May 14, 1986).
McCauley et al.,KSOS: The Design of a Secure Operating System, Version 1.2 (1979),UNIX Operating System.
Casey, Jr. Thomas Andrew
Gasser Morrie
Hall Judith Shelhorse
Kahn Clifford Earl
Kendall Leslie Richard
Darrow Justin T.
Hewlett--Packard Development Company, L.P.
LandOfFree
Processing trusted commands in trusted and untrusted... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Processing trusted commands in trusted and untrusted..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Processing trusted commands in trusted and untrusted... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3393858