Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2007-11-27
2007-11-27
Moise, Emmanuel L. (Department: 2137)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S190000, C726S020000
Reexamination Certificate
active
09979905
ABSTRACT:
The preferred embodiment of the invention comprises a computer system which employs a trusted display processor (260), which has a trusted processor (300) and trusted memory (305, 315, 335, 345) physically and functionally distinct from the processor and memory of the computer system. The trusted display processor (260) is immune to unauthorised modification or inspection of internal data. It is physical to prevent forgery, tamper-resistant to prevent counterfeiting, and has crypto functions (340) to securely communicate at a distance. The trusted display processor (260) interacts with a user's smartcard (122) in order to extract and display a trusted image, or seal (1000), generate a digital signature of the bitmap of a document image and control the video memory (315) so that other processes of the computer system cannot subvert the image during the signing process. The user interacts with the trusted display processor via a trusted switch (135).
REFERENCES:
patent: 5214702 (1993-05-01), Fischer
patent: 5280583 (1994-01-01), Nakayama et al.
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5473692 (1995-12-01), Davis
patent: 5572590 (1996-11-01), Chess
patent: 5619571 (1997-04-01), Sandstrom et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5701343 (1997-12-01), Takashima et al.
patent: 5822435 (1998-10-01), Boebert et al.
patent: 5867579 (1999-02-01), Saito
patent: 5870721 (1999-02-01), Norris
patent: 5903732 (1999-05-01), Reed et al.
patent: 5907619 (1999-05-01), Davis
patent: 5915024 (1999-06-01), Kitaori et al.
patent: 5953528 (1999-09-01), Sullivan
patent: 5953538 (1999-09-01), Duncan et al.
patent: 5990912 (1999-11-01), Swanson
patent: 6018724 (2000-01-01), Arent
patent: 6023765 (2000-02-01), Kuhn
patent: 6029245 (2000-02-01), Scanlan
patent: 6057862 (2000-05-01), Margulis
patent: 6138239 (2000-10-01), Veil
patent: 6282535 (2001-08-01), Pham et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6453416 (2002-09-01), Epstein
patent: 6515988 (2003-02-01), Eldridge et al.
patent: 6606744 (2003-08-01), Mikurak
patent: 6615166 (2003-09-01), Guheen et al.
patent: 6671805 (2003-12-01), Brown et al.
patent: 6757826 (2004-06-01), Paltenghe
patent: 6959382 (2005-10-01), Kinnis et al.
patent: 2001/0016838 (2001-08-01), Landrock
patent: 2002/0012432 (2002-01-01), England et al.
patent: 2003/0030680 (2003-02-01), Cofta et al.
patent: 0 386 867 (1990-09-01), None
patent: 0 717 337 (1996-06-01), None
patent: 0 926 605 (1999-06-01), None
patent: 1 030 237 (2000-08-01), None
patent: 1 085 396 (2001-03-01), None
patent: 0020441.2 (2000-08-01), None
patent: 94/01821 (1994-01-01), None
patent: 00/31644 (2000-06-01), None
patent: 00/48063 (2000-08-01), None
patent: 00/54125 (2000-09-01), None
patent: 00/54126 (2000-09-01), None
patent: 00/73913 (2000-12-01), None
patent: 01/27722 (2001-04-01), None
U.S. Appl. No. 09/979,904, filed Nov. 27, 2001, Proudler et al.
U.S. Appl. No. 10/162,020, filed Jun. 3, 2002, Proudler.
Yee, B., “Using Secure Coprocessors,” Doctoral thesis—Carnegie Mellon University, pp. 1-94 (May 1994).
“Information technology—Security techniques—Entity authentication; Part 3: Mechanisms using digital signature techniques,”ISO/IEC 9798-3, Second Edition, pp. 1-6 (1998).
“Information technology—Security techniques—Key management—Part 3: Mechanisms using asymmetric techniques,”ISO/IEC 11770-3, pp. 1-34 (1999).
Anderson, R. and Markus Kuhn, “Tamper Resistance—a Cautionary Note,” 16 pages, located at Internet address <www.cl.cam.ac.uk/˜mgk25/tamper.html> (1996).
Berger, J.L., et al., “Compartmented Mode Workstation: Prototype Highlights,”IEEE Transactions on Software Engineering, vol. 16, No. 6, pp. 608-618 (Jun. 1990).
Wiseman, S., et al, “The Trusted Path between SMITE and the User,”IEEE Proceedings of the Symposium on Security and Privacy, pp. 147-155 (1988).
Woo, T.Y.C. and S.S. Lam, “Authentication for Distributed Systems,”Computer, vol. 25, No. 1, pp. 39-52 (Jan. 1992).
Trusted Computing Platform Alliance, Main Specification Version 1.0, 284 pages (Jan. 25, 2001).
Intel, “Wired For Management Baseline specification v2.0,”Boot Integrity Services Application Programming Interface Version 1.0, 64 pages (Dec. 28, 1998).
“Building a Foundation of Trust in the PC,” The Trusted Computing Platform Alliance, 9 pages, located at Internet address <www.trustedpc.org/home/home.html> (Jan. 2000).
Boot Integrity Services Application Programming Interface, Version 1.0, Intel Corporation, pp. 1-60 (Dec. 28, 1998).
Balacheff Boris
Chan David
Chen Liqun
Proudler Graeme John
Hewlett--Packard Development Company, L.P.
Ladas & Parry LLP
Moise Emmanuel L.
Pyzocha Michael
LandOfFree
System for providing a trustworthy user interface does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System for providing a trustworthy user interface, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for providing a trustworthy user interface will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3876850