Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2005-12-20
2010-06-08
Zand, Kambiz (Department: 2434)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S001000, C713S150000, C713S162000, C713S165000, C726S026000, C380S200000
Reexamination Certificate
active
07734934
ABSTRACT:
Provided are techniques for migrating data. Contents are sealed to one or more registers. In response to determining that secure backup is enabled, platform metrics are stored in a private store. An out-of-band request is received. A response to the out-of-band request is provided using the stored platform metrics.Other embodiments are described and claimed.
REFERENCES:
patent: 6697489 (2004-02-01), Candelore
patent: 7299354 (2007-11-01), Khanna et al.
patent: 7421588 (2008-09-01), Challener et al.
patent: 2003/0110372 (2003-06-01), Proudler
patent: 2004/0172662 (2004-09-01), Danker et al.
patent: 2005/0010811 (2005-01-01), Zimmer et al.
patent: 2005/0091494 (2005-04-01), Hyser
patent: 2005/0144443 (2005-06-01), Cromer et al.
patent: 2005/0289652 (2005-12-01), Sharma et al.
patent: 2006/0005000 (2006-01-01), King et al.
patent: 2006/0026419 (2006-02-01), Arndt et al.
patent: 2006/0053290 (2006-03-01), Randle et al.
patent: 2006/0075223 (2006-04-01), Bade et al.
Dierks, T. & C. Allen, “The TLS Protocol Version 1.0”, RFC 2246, [online], Jan. 1999, [retrieved on Jul. 22, 2005], retrieved from the Internet at <URL: http://www/faqs.org/rfcs/rfc2246.html>.
Evers, J., “Microsoft's Leaner Approach to Vista Security”, [online], Aug. 29, 2005, [retrieved on Sep. 16, 2005], retrieved from the Internet at <URL: http:/
ews.com.com/microsofts+leaner+approach+to+Vista+Security/2100-7355—3-58438...>.
IEEE Computer Society, “IEEE Standard for Information Technology 802.3- Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications”, Mar. 8, 2002, pp. 1-32.
IEEE Computer Society, “Supplement to IEEE Standard for Information Technology 802.11b- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band”, Jan. 20, 2000, pp. iii-vi & 1-10.
Information Sciences Institute, “Internet Protocol”, RFC 791, Sep. 1981, pp. 1-45.
Information Sciences Institute, “Transmission Control Protocol”, RFC 793, Sep. 1981, pp. 1-85.
Krueger, M., R. Haagens, C. Sapuntzakis, & M. Bakke, “Small Computer Systems Interface Protocol Over the Internet (iSCSI) Requirements and Design Considerations”, RFC 3347, Jul. 2002, pp. 1-26.
Microsoft Corporation, “Secure Startup- Full Volume Encryption: Technical Overview”, [online], Apr. 25, 2005, [retrieved on Jul. 20, 2005], retrieved from the Internet at <URL: http://www.microsoft.com/whdc/system/platform/pcdesign/secure-start—tech.mspx>.
Microsoft Corporation, “Secure Startup- Full Volume Encryption: Technical Overview”, WinHEC 2005 Version, Apr. 22, 2005, pp. 1-20.
PCI-SIG, “PCI Specifcations”, [online], © 2004, retrieved from the Internet at <URL: http://www.pci-sig.com>.
Satran, J., K. Meth, C. Sapuntzakis, M. Chadalapaka, & E. Zeidner, “iSCSI”, Jan. 19, 2003, pp. 1-238.
Serial ATA Workgroup, “Serial ATA: High Speed Serialized AT Attachment”, Revision 1.0, Aug. 29, 2001, pp. 1-34.
Shanley, T. & D. Anderson,PCI System Architecture, Fourth Edition, Addison-Wesley, Boston, 1999, pp. 1-21 (Table of Contents through Ch. 2).
Trusted Computing Group, “About the Trusted Computing Group”, © 2005, [retrieved on Dec. 20, 2005], retrieved from the Internet at <URL: http://www.trustedcomputinggroup.org/about>.
Trusted Computing Group, “TCG Specification Architecture Overview”, Revision 1.2, Apr. 28, 2004, pp. i-vi & 1-48.
Weber, R., M. Rajagopal, F. Travostino, M. O'Odonnell, C. Monia, & M. Merhar, “Fibre Channel (FC) Frame Encapsulation”, RFC 3643, Dec. 2003, pp. 1-20.
Weber, R.O. (Ed.), “Information Technology- SCSI Architecture Model- 2 (SAM-2)”, Revision 24, Sep. 12, 2002, pp. 1-102.
Rothman Michael A.
Zimmer Vincent J.
Bayou Yonas
Davda Janaki K.
Intel Corporation
Konrad Raynes & Victor LLP
Zand Kambiz
LandOfFree
Seamless data migration does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Seamless data migration, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Seamless data migration will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4228866