Providing secure input and output to a trusted agent in a...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S192000, C713S194000, C713S164000, C713S165000, C713S166000, C713S167000, C726S002000, C726S003000, C726S004000, C726S005000, C726S006000, C726S007000, C726S026000, C726S027000, C726S028000, C726S029000, C380S200000, C380S201000

Reexamination Certificate

active

07496768

ABSTRACT:
Techniques are disclosed to provide security for user output and input in which a first, host operating system is used along with a second, high assurance operating system (nexus), where the first system provides at least some of the infrastructure for the second system. A trusted UI engine has a trusted input manager and a trusted output manager. The trusted input manager controls access to trusted input, distributing decrypted input to the host operating system where appropriate, or to the appropriate process running in the nexus. The trusted output manager manages output to the display, and allows trusted agents in the nexus to output data for display without needing to be aware of output-device-dependent details.

REFERENCES:
patent: 5822435 (1998-10-01), Boebert et al.
patent: 7159210 (2007-01-01), Griffin et al.
patent: 2002/0070920 (2002-06-01), Challener et al.
patent: 0 588 083 (1994-03-01), None
patent: 0 526 426 (2005-04-01), None
Garfinkel, T . et al., “Terra: A Virtue Machine-Based Platform for Trusted Computing”,ACm Symposium on Operating Systems Principles, Proceedings of the nineteenth(19th)ACm Symposium on Operating Systems Principles, 2003, 193-206.
Josang, A. et al., “User Interface Requirements for Authentication of Communication”,ACM International Conference Proceeding Series, Proceedings of the Fourth Australian User Interface Conference on User Interfaces 2003, 2003, 18, 75-80.
Kent, S.T., “Encryption-Based Protection for Interactive User/Computer Communication”,Proceedings of the Fifth Symposium on Data Communications, 1977, 5.7-5.13.
Landwehr, C.E. et al., “A Taxonomy of Computer Program Security Flaws”,ACM Computing Surveys(CSUR), 1994, 26(3), 211-254.
Salles, E.J. et al., “Security of runtime Extensible Virtual Environments”,Collaborative Virtual Environments, Proceedings of the 4thInternational Conference on Collaborative Virtual Environments, 2002, 97-104.
Spalka, Adrian, Cremers, Armin B., Langweg, Hanno, “Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs”,Trusted Information. The New Decade Challenge. Proceedings of IFIP/SEC'01, 2001, 403-419.
Epstein, J. et al., “User Interface for a High Assurance Windowing System”,Computer Security Applications Conference, IEEE Computer Soc.,1993, 256-264, XP010096756.
Kilpatrick, D. et al., “Securing the X Window System with SELinux”, Mar. 2003, http://www.nsa.gov/selinux/papers, 33 pages, XP-002327143.
At WinHEC, Microsoft Discusses Details of Next-Generation Secure Computing Base, http://www.microsoft.com/presspass/features, May 2003, 8 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Providing secure input and output to a trusted agent in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Providing secure input and output to a trusted agent in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Providing secure input and output to a trusted agent in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4127150

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.