Protection of the configuration of modules in computing...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S001000, C713S002000, C713S100000, C713S155000, C726S026000

Reexamination Certificate

active

07430668

ABSTRACT:
A method of protecting from modification computer apparatus comprising a plurality of functional modules by monitoring the configuration of functional modules within the computer apparatus. The method comprises: storing a module configuration of the computer apparatus; and checking the actual module configuration against the stored module configuration, and inhibiting function of the computer apparatus if the actual module configuration does not satisfactorily match the stored module configuration. Advantageously, the module configuration is stored on a security token, such as a smart card.

REFERENCES:
patent: 5029159 (1991-07-01), Dolev
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5363447 (1994-11-01), Rager et al.
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5444850 (1995-08-01), Chang
patent: 5499296 (1996-03-01), Micali
patent: 5680547 (1997-10-01), Chang
patent: 5844986 (1998-12-01), Davis
patent: 5943423 (1999-08-01), Muftic
patent: 5948101 (1999-09-01), David et al.
patent: 6012100 (2000-01-01), Frailong et al.
patent: 6209089 (2001-03-01), Selitrennikoff et al.
patent: 6233685 (2001-05-01), Smith et al.
patent: 6233687 (2001-05-01), White
patent: 6240511 (2001-05-01), Blumenau et al.
patent: 6327652 (2001-12-01), England et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6353885 (2002-03-01), Herzi et al.
patent: 6408392 (2002-06-01), White
patent: 6434697 (2002-08-01), Leyda et al.
patent: 6453416 (2002-09-01), Epstein
patent: 6539480 (2003-03-01), Drews
patent: 6560706 (2003-05-01), Carbajal et al.
patent: 6633981 (2003-10-01), Davis
patent: 0 421 409 (1991-04-01), None
patent: 0 510 244 (1992-10-01), None
patent: 0 848 315 (1998-06-01), None
patent: 0 849 657 (1998-06-01), None
patent: WO 95/24696 (1995-09-01), None
patent: WO 97/07463 (1997-02-01), None
patent: WO 97/37305 (1997-10-01), None
patent: WO 98/15082 (1998-04-01), None
patent: WO 98/25372 (1998-06-01), None
patent: 99/31842 (1999-06-01), None
patent: 00/48063 (2000-08-01), None
Yee, B., “Using Secure Coprocessors,” Doctoral thesis—Carnegie Mellon University, pp. 1-94 (May 1994).
Anderson, R. and Markus Kuhn, “Tamper Resistance—a Cautionary Note,” 16 pages, located at Internet address <www.cl.cam.ac.uk/˜mgk25/tamper.html> (1996).
Intel, “Wired for Management Baseline specification v2.0,”Boot Integrity Services Application Programming Interface Version 1.0, 64 pages (Dec. 28, 1998).
“Information technology-Security techniques-Entity Authentication—Part 3: Mechanisms using digital signature techniques,”ISO/IEC 9798-3, 6 pages (1998).
“Information technology-Security techniques-Key management—Part 3: Mechanisms using asymmetric techniques,”ISO/IEC 11770-3, pp. 1-23 and Annexes A-E (1999).
The Trusted Computing Platform Alliance, “Building a Foundation of Trust in the PC,”, 9 pages, located at Internet address <www.trustedpc.org/home/home.html> (Jan. 2000).
Trusted Computing Platform Alliance, Main Specification Version 1.0, 284 pages (Jan. 25, 2001).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Protection of the configuration of modules in computing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Protection of the configuration of modules in computing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protection of the configuration of modules in computing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3988824

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.