Security attributes in trusted computing systems

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S002000, C713S164000, C713S166000, C713S193000, C713S194000, C718S100000, C718S104000, C708S135000

Reexamination Certificate

active

07600261

ABSTRACT:
A system comprising a trusted computing platform including one or more logically protected computing environments, each of which is associated with at least one service or process supported by said system, the system being arranged to load onto said trusted computing platform a predetermined security policy including one or more security rules for controlling the operation of each of said logically protected computing environments, the security rules for at least one of said logically protected computing environments including an execution control rule which defines the security attributes to be applied to a service or process associated with said logically protected computing environment when said service or process is started.

REFERENCES:
patent: 5825877 (1998-10-01), Dan et al.
patent: 5915085 (1999-06-01), Koved
patent: 6389534 (2002-05-01), Elgamal et al.
patent: 6430561 (2002-08-01), Austel et al.
patent: 7013390 (2006-03-01), Elgamal et al.
patent: 7073059 (2006-07-01), Worely et al.
patent: 7216369 (2007-05-01), Wiseman et al.
patent: 7272832 (2007-09-01), Gardner
patent: 7302698 (2007-11-01), Proudler et al.
patent: 7448079 (2008-11-01), Tremain
patent: 2002/0077803 (2002-06-01), Kudoh et al.
patent: 2002/0089528 (2002-07-01), Hay et al.
patent: 2002/0174369 (2002-11-01), Miyazaki et al.
patent: 2002/0194241 (2002-12-01), Griffin et al.
patent: 2003/0149895 (2003-08-01), Choo et al.
patent: 2003/0188179 (2003-10-01), Challener et al.
patent: 2004/0064457 (2004-04-01), Zimmer et al.
patent: 2 376 764 (2002-12-01), None
patent: 2 379 764 (2003-03-01), None
patent: 10-083310 (1998-03-01), None
patent: 2004-535611 (2004-11-01), None
patent: 00/48063 (2000-08-01), None
patent: 00/54125 (2000-09-01), None
patent: 02061552 (2002-08-01), None
Grawrock, David. “TCPA Main Specification 1.1b.” Feb. 22, 2002. pp. 1-23.
Bajikar, Sundeep. “Trusted Platform Module (TPM) based security on Notebook PCs—White Paper.” Jun. 20, 2002. Mobile Platforms Group, Intel Corporations. 20 pages. Retrieved from http://www.intel.com/design/mobile/platform/downloads/Trusted—Platform—Mobile—White—Paper.pdf.
Lie, D., et al, ‘Implementing an Untrusted Operating System on Trusted Hardware’, Copyright 2003, ACM 1-58113-757-5/03/0010, entire document, http://www.cs.rochester.edu/meetings/sosp2003/papers/p134-lie.pdf.
U.S. Appl. No. 10/810,348, filed Mar. 26, 2004, Wray.
Dalton, C.I., et al., “Applying Military Grade Security to the Internet,”Computer Networks and ISND Systems, vol. 29, pp. 1799-1808 (1997).
“Trusted Computing Platform Alliance (TCPA), TCPA Design Philosophies and Concepts,” Version 1.0, Internet: <http://www.trustedpc.org> pp. 1-30 (Jan. 2001).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security attributes in trusted computing systems does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security attributes in trusted computing systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security attributes in trusted computing systems will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4131937

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.