Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2011-03-08
2011-03-08
Pyzocha, Michael (Department: 2437)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C726S020000
Reexamination Certificate
active
07904730
ABSTRACT:
The preferred embodiment of the invention comprises a computer system which employs a trusted display processor (260), which has a trusted processor (300) and trusted memory (305, 315, 335, 345) physically and functionally distinct from the processor and memory of the computer system. The trusted display processor (260) is immune to unauthorised modification or inspection of internal data. It is physical to prevent forgery, tamper-resistant to prevent counterfeiting, and has crypto functions (340) to securely communicate at a distance. The trusted display processor (260) interacts with a user's smartcard (122) in order to extract and display a trusted image, or seal (1000), generate a digital signature of the bitmap of a document image and control the video memory (315) so that other processes of the computer system cannot subvert the image during the signing process. The user interacts with the trusted display processor via a trusted switch (135).
REFERENCES:
patent: 5214702 (1993-05-01), Fischer
patent: 5280583 (1994-01-01), Nakayama et al.
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5473692 (1995-12-01), Davis
patent: 5572590 (1996-11-01), Chess
patent: 5619571 (1997-04-01), Sandstrom et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5701343 (1997-12-01), Takashima et al.
patent: 5822435 (1998-10-01), Boebert et al.
patent: 5867579 (1999-02-01), Saito
patent: 5870721 (1999-02-01), Norris
patent: 5903732 (1999-05-01), Reed et al.
patent: 5907619 (1999-05-01), Davis
patent: 5915024 (1999-06-01), Kitaori et al.
patent: 5936220 (1999-08-01), Hoshino et al.
patent: 5953528 (1999-09-01), Sullivan
patent: 5953538 (1999-09-01), Duncan et al.
patent: 5974142 (1999-10-01), Heer et al.
patent: 5990912 (1999-11-01), Swanson
patent: 6018724 (2000-01-01), Arent
patent: 6023765 (2000-02-01), Kuhn
patent: 6029245 (2000-02-01), Scanlan
patent: 6044158 (2000-03-01), Terpening et al.
patent: 6057862 (2000-05-01), Margulis
patent: 6092202 (2000-07-01), Veil et al.
patent: 6138239 (2000-10-01), Veil
patent: 6282535 (2001-08-01), Pham et al.
patent: 6286102 (2001-09-01), Cromer et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6417819 (2002-07-01), Matsumoto et al.
patent: 6453416 (2002-09-01), Epstein
patent: 6490049 (2002-12-01), Cunnagin et al.
patent: 6515988 (2003-02-01), Eldridge et al.
patent: 6606744 (2003-08-01), Mikurak
patent: 6615166 (2003-09-01), Guheen et al.
patent: 6671805 (2003-12-01), Brown et al.
patent: 6757826 (2004-06-01), Paltenghe
patent: 6959382 (2005-10-01), Kinnis et al.
patent: 7302698 (2007-11-01), Proudler et al.
patent: 2001/0016838 (2001-08-01), Landrock
patent: 2001/0043227 (2001-11-01), Shaw
patent: 2002/0012432 (2002-01-01), England et al.
patent: 2002/0059364 (2002-05-01), Coulthard et al.
patent: 2003/0030680 (2003-02-01), Cofta et al.
patent: 0 386 867 (1990-09-01), None
patent: 0 717 337 (1996-06-01), None
patent: 0 926 605 (1999-06-01), None
patent: 1 030 237 (2000-08-01), None
patent: 1 085 396 (2001-03-01), None
patent: 1159662 (2001-05-01), None
patent: 0020441.2 (2000-08-01), None
patent: 94/01821 (1994-01-01), None
patent: 00/31644 (2000-06-01), None
patent: 00/54125 (2000-06-01), None
patent: 00/48063 (2000-08-01), None
patent: 00/73913 (2000-12-01), None
patent: 01/27722 (2001-04-01), None
Yee, B., “Using Secure Compressors,” Doctoral Thesis-Carnegie Melon University, pp. 1-94 (May 1994).
Boot Integrity Services Application Programming Interface, Version 1.0, Intel Corporation, pp. 1-60 (Dec. 28, 1998).
“Information Technology-Security Techniques-Entity Authentication; Part 3: Mechanisms using digital signature techniques,” ISO/IEC 9798-3, Second Edition, pp. 1-6 (1998).
Information Technology-Security techniques-key management-Part 3: Mechanisms using assymetric techniques, ISO/IEC 11770-3, pp. 1-34 (1999).
Trusted Platform Computing Alliance, Main Specification Version 1.0, 284 pp. (Jan. 25, 2001).
Anderson, R., et al., “Tamper Resistance-a Cautionary Note,” 16 pages, located at Internet address <www.cl.cam.ac.uk/˜mgk25/tamper.html> (1996).
Wiseman, S., et al., “The Trusted Path between SMITE and the User,” IEEE Proceedings of the Symposium on Security and Privacy, pp. 147-155 (1988).
Woo, T.Y.C., et al., “Authentication for Distributed Systems,” Computer, vol. 25, No. 1, pp. 39-52 (Jan. 1992).
Intel, “Wired for management Baseline specification v.2.0,” Boot Integrity Services Application Programming Interface Version 1.0, 64 pp. (Dec. 28, 1998).
Building a Foundation of Trust in the PC, the Trusted computing Platform Alliance, 9 pages, located at Internet address, <www.trustedpc.org/home/home.html> (Jan. 2000).
Balacheff Boris
Chan David
Chen Liqun
Proudler Graeme John
Hewlett--Packard Development Company, L.P.
Pyzocha Michael
LandOfFree
System for providing a trustworthy user interface does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System for providing a trustworthy user interface, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for providing a trustworthy user interface will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2690658