Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-08-29
2000-12-26
Swann, Tod R.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
380286, 705 64, 705 67, 705 71, 709230, 709237, 717 11, 713150, 713168, 713180, G06F 1130
Patent
active
061675210
ABSTRACT:
An apparatus, system and method for secure code-downloading and information exchange, in the full generality of complex code dependencies while considering the implications of mutual distrust and hot-swapping. Included are secure techniques wherein an authority signs code from another party upon which that authority depends in order to establish that a trusted execution environment, is being preserved. Trusted code is employed to ensure that proprietary data is destroyed, disabled, and/or made unreadable, when a change causes the trusted execution environment to cease holding to a certain security level. A carefully constructed key structure is employed to ensure that communications allegedly from particular code in a particular environment can be authenticated as such. Authenticity of code that decides the authenticity of public-key signatures, and/or the authenticity of other code is cared for. In particular, the loading code that performs these tasks may itself be reloadable. Authenticity is maintained in physically secure coprocessors with multiple levels of dependent software that is independently downloadable by mutually suspicious authorities, and in physically secure coprocessors whose software has sufficient richness and complexity so as to be certainly permeable. Recoverability is provided for physically secure coprocessors from code of arbitrary evil running at arbitrary privilege.
REFERENCES:
patent: 4218582 (1980-08-01), Hellman et al.
patent: 5057996 (1991-10-01), Cutler et al.
patent: 5412717 (1995-05-01), Fischer
patent: 5493682 (1996-02-01), Tyra et al.
patent: 5557518 (1996-09-01), Rosen
patent: 5808625 (1998-09-01), Picott et al.
patent: 5825877 (1998-10-01), Dan et al.
patent: 5852666 (1998-12-01), Miller et al.
patent: 5929864 (1999-07-01), Picott et al.
patent: 6058478 (2000-05-01), Davis
patent: 6088797 (2000-07-01), Rosen
Federal Information Processing Standards Publication, Security Requirements For Cryptogra. Modules, US Dept. of Commerce, Jan. 11, 1994, FIPS PUB 140-1, p. 1-56.
Schneier, Applied Cryptography, 2nd edition, p. 185-186, Oct. 1995.
Smith Sean William
Weingart Steve Harris
Callahan Paul E.
Herzberg Louis P.
International Business Machines - Corporation
Swann Tod R.
LandOfFree
Securely downloading and executing code from mutually suspicious does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Securely downloading and executing code from mutually suspicious, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Securely downloading and executing code from mutually suspicious will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1006806