Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2003-10-24
2009-02-24
Chai, Longbit (Department: 2431)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S192000, C713S194000, C713S164000, C713S165000, C713S166000, C713S167000, C726S002000, C726S003000, C726S004000, C726S005000, C726S006000, C726S007000, C726S026000, C726S027000, C726S028000, C726S029000, C380S200000, C380S201000
Reexamination Certificate
active
07496768
ABSTRACT:
Techniques are disclosed to provide security for user output and input in which a first, host operating system is used along with a second, high assurance operating system (nexus), where the first system provides at least some of the infrastructure for the second system. A trusted UI engine has a trusted input manager and a trusted output manager. The trusted input manager controls access to trusted input, distributing decrypted input to the host operating system where appropriate, or to the appropriate process running in the nexus. The trusted output manager manages output to the display, and allows trusted agents in the nexus to output data for display without needing to be aware of output-device-dependent details.
REFERENCES:
patent: 5822435 (1998-10-01), Boebert et al.
patent: 7159210 (2007-01-01), Griffin et al.
patent: 2002/0070920 (2002-06-01), Challener et al.
patent: 0 588 083 (1994-03-01), None
patent: 0 526 426 (2005-04-01), None
Garfinkel, T . et al., “Terra: A Virtue Machine-Based Platform for Trusted Computing”,ACm Symposium on Operating Systems Principles, Proceedings of the nineteenth(19th)ACm Symposium on Operating Systems Principles, 2003, 193-206.
Josang, A. et al., “User Interface Requirements for Authentication of Communication”,ACM International Conference Proceeding Series, Proceedings of the Fourth Australian User Interface Conference on User Interfaces 2003, 2003, 18, 75-80.
Kent, S.T., “Encryption-Based Protection for Interactive User/Computer Communication”,Proceedings of the Fifth Symposium on Data Communications, 1977, 5.7-5.13.
Landwehr, C.E. et al., “A Taxonomy of Computer Program Security Flaws”,ACM Computing Surveys(CSUR), 1994, 26(3), 211-254.
Salles, E.J. et al., “Security of runtime Extensible Virtual Environments”,Collaborative Virtual Environments, Proceedings of the 4thInternational Conference on Collaborative Virtual Environments, 2002, 97-104.
Spalka, Adrian, Cremers, Armin B., Langweg, Hanno, “Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs”,Trusted Information. The New Decade Challenge. Proceedings of IFIP/SEC'01, 2001, 403-419.
Epstein, J. et al., “User Interface for a High Assurance Windowing System”,Computer Security Applications Conference, IEEE Computer Soc.,1993, 256-264, XP010096756.
Kilpatrick, D. et al., “Securing the X Window System with SELinux”, Mar. 2003, http://www.nsa.gov/selinux/papers, 33 pages, XP-002327143.
At WinHEC, Microsoft Discusses Details of Next-Generation Secure Computing Base, http://www.microsoft.com/presspass/features, May 2003, 8 pages.
Chew Christine M.
Ray Kenneth D.
Roberts Paul C.
Willman Bryan
Chai Longbit
Microsoft Corporation
Woodcock & Washburn LLP
LandOfFree
Providing secure input and output to a trusted agent in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Providing secure input and output to a trusted agent in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Providing secure input and output to a trusted agent in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4127150