Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate
2000-02-15
2008-09-30
Nguyen, Minh Dieu (Department: 2137)
Electrical computers and digital processing systems: support
Computer program modification detection by cryptography
C713S001000, C713S002000, C713S100000, C713S155000, C726S026000
Reexamination Certificate
active
07430668
ABSTRACT:
A method of protecting from modification computer apparatus comprising a plurality of functional modules by monitoring the configuration of functional modules within the computer apparatus. The method comprises: storing a module configuration of the computer apparatus; and checking the actual module configuration against the stored module configuration, and inhibiting function of the computer apparatus if the actual module configuration does not satisfactorily match the stored module configuration. Advantageously, the module configuration is stored on a security token, such as a smart card.
REFERENCES:
patent: 5029159 (1991-07-01), Dolev
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5363447 (1994-11-01), Rager et al.
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5444850 (1995-08-01), Chang
patent: 5499296 (1996-03-01), Micali
patent: 5680547 (1997-10-01), Chang
patent: 5844986 (1998-12-01), Davis
patent: 5943423 (1999-08-01), Muftic
patent: 5948101 (1999-09-01), David et al.
patent: 6012100 (2000-01-01), Frailong et al.
patent: 6209089 (2001-03-01), Selitrennikoff et al.
patent: 6233685 (2001-05-01), Smith et al.
patent: 6233687 (2001-05-01), White
patent: 6240511 (2001-05-01), Blumenau et al.
patent: 6327652 (2001-12-01), England et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6353885 (2002-03-01), Herzi et al.
patent: 6408392 (2002-06-01), White
patent: 6434697 (2002-08-01), Leyda et al.
patent: 6453416 (2002-09-01), Epstein
patent: 6539480 (2003-03-01), Drews
patent: 6560706 (2003-05-01), Carbajal et al.
patent: 6633981 (2003-10-01), Davis
patent: 0 421 409 (1991-04-01), None
patent: 0 510 244 (1992-10-01), None
patent: 0 848 315 (1998-06-01), None
patent: 0 849 657 (1998-06-01), None
patent: WO 95/24696 (1995-09-01), None
patent: WO 97/07463 (1997-02-01), None
patent: WO 97/37305 (1997-10-01), None
patent: WO 98/15082 (1998-04-01), None
patent: WO 98/25372 (1998-06-01), None
patent: 99/31842 (1999-06-01), None
patent: 00/48063 (2000-08-01), None
Yee, B., “Using Secure Coprocessors,” Doctoral thesis—Carnegie Mellon University, pp. 1-94 (May 1994).
Anderson, R. and Markus Kuhn, “Tamper Resistance—a Cautionary Note,” 16 pages, located at Internet address <www.cl.cam.ac.uk/˜mgk25/tamper.html> (1996).
Intel, “Wired for Management Baseline specification v2.0,”Boot Integrity Services Application Programming Interface Version 1.0, 64 pages (Dec. 28, 1998).
“Information technology-Security techniques-Entity Authentication—Part 3: Mechanisms using digital signature techniques,”ISO/IEC 9798-3, 6 pages (1998).
“Information technology-Security techniques-Key management—Part 3: Mechanisms using asymmetric techniques,”ISO/IEC 11770-3, pp. 1-23 and Annexes A-E (1999).
The Trusted Computing Platform Alliance, “Building a Foundation of Trust in the PC,”, 9 pages, located at Internet address <www.trustedpc.org/home/home.html> (Jan. 2000).
Trusted Computing Platform Alliance, Main Specification Version 1.0, 284 pages (Jan. 25, 2001).
Chan David
Chen Liqun
Hewlett--Packard Development Company, L.P.
Nguyen Minh Dieu
LandOfFree
Protection of the configuration of modules in computing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Protection of the configuration of modules in computing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protection of the configuration of modules in computing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3988824