Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2004-03-26
2009-10-06
Orgad, Edan (Department: 2439)
Information security
Prevention of unauthorized use of data including prevention...
C713S002000, C713S164000, C713S166000, C713S193000, C713S194000, C718S100000, C718S104000, C708S135000
Reexamination Certificate
active
07600261
ABSTRACT:
A system comprising a trusted computing platform including one or more logically protected computing environments, each of which is associated with at least one service or process supported by said system, the system being arranged to load onto said trusted computing platform a predetermined security policy including one or more security rules for controlling the operation of each of said logically protected computing environments, the security rules for at least one of said logically protected computing environments including an execution control rule which defines the security attributes to be applied to a service or process associated with said logically protected computing environment when said service or process is started.
REFERENCES:
patent: 5825877 (1998-10-01), Dan et al.
patent: 5915085 (1999-06-01), Koved
patent: 6389534 (2002-05-01), Elgamal et al.
patent: 6430561 (2002-08-01), Austel et al.
patent: 7013390 (2006-03-01), Elgamal et al.
patent: 7073059 (2006-07-01), Worely et al.
patent: 7216369 (2007-05-01), Wiseman et al.
patent: 7272832 (2007-09-01), Gardner
patent: 7302698 (2007-11-01), Proudler et al.
patent: 7448079 (2008-11-01), Tremain
patent: 2002/0077803 (2002-06-01), Kudoh et al.
patent: 2002/0089528 (2002-07-01), Hay et al.
patent: 2002/0174369 (2002-11-01), Miyazaki et al.
patent: 2002/0194241 (2002-12-01), Griffin et al.
patent: 2003/0149895 (2003-08-01), Choo et al.
patent: 2003/0188179 (2003-10-01), Challener et al.
patent: 2004/0064457 (2004-04-01), Zimmer et al.
patent: 2 376 764 (2002-12-01), None
patent: 2 379 764 (2003-03-01), None
patent: 10-083310 (1998-03-01), None
patent: 2004-535611 (2004-11-01), None
patent: 00/48063 (2000-08-01), None
patent: 00/54125 (2000-09-01), None
patent: 02061552 (2002-08-01), None
Grawrock, David. “TCPA Main Specification 1.1b.” Feb. 22, 2002. pp. 1-23.
Bajikar, Sundeep. “Trusted Platform Module (TPM) based security on Notebook PCs—White Paper.” Jun. 20, 2002. Mobile Platforms Group, Intel Corporations. 20 pages. Retrieved from http://www.intel.com/design/mobile/platform/downloads/Trusted—Platform—Mobile—White—Paper.pdf.
Lie, D., et al, ‘Implementing an Untrusted Operating System on Trusted Hardware’, Copyright 2003, ACM 1-58113-757-5/03/0010, entire document, http://www.cs.rochester.edu/meetings/sosp2003/papers/p134-lie.pdf.
U.S. Appl. No. 10/810,348, filed Mar. 26, 2004, Wray.
Dalton, C.I., et al., “Applying Military Grade Security to the Internet,”Computer Networks and ISND Systems, vol. 29, pp. 1799-1808 (1997).
“Trusted Computing Platform Alliance (TCPA), TCPA Design Philosophies and Concepts,” Version 1.0, Internet: <http://www.trustedpc.org> pp. 1-30 (Jan. 2001).
Baum Ronald
Hewlett--Packard Development Company, L.P.
Orgad Edan
LandOfFree
Security attributes in trusted computing systems does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security attributes in trusted computing systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security attributes in trusted computing systems will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4131937