Systems and methods using cryptography to protect secure...

Electrical computers and digital processing systems: support – Digital data processing system initialization or configuration – Loading initialization program

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S175000, C713S194000, C726S030000

Reexamination Certificate

active

07904707

ABSTRACT:
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.

REFERENCES:
patent: 4672572 (1987-06-01), Alsberg
patent: 4799156 (1989-01-01), Shavit et al.
patent: 4823264 (1989-04-01), Deming
patent: 4930073 (1990-05-01), Cina, Jr.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5111390 (1992-05-01), Ketcham
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5253297 (1993-10-01), Press
patent: 5319705 (1994-06-01), Halter et al.
patent: 5343527 (1994-08-01), Moore
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5479509 (1995-12-01), Ugon
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5692047 (1997-11-01), McManis
patent: 5696827 (1997-12-01), Brands
patent: 5757914 (1998-05-01), McManis
patent: 5757915 (1998-05-01), Aucsmith et al.
patent: 5982891 (1999-11-01), Ginter et al.
patent: 6157721 (2000-12-01), Shear et al.
patent: 6292569 (2001-09-01), Shear et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6701433 (2004-03-01), Schell et al.
patent: 7120802 (2006-10-01), Shear et al.
patent: 7133846 (2006-11-01), Ginter et al.
patent: 7152045 (2006-12-01), Hoffman
patent: 7165174 (2007-01-01), Ginter et al.
patent: 7405724 (2008-07-01), Drummond et al.
patent: 7581092 (2009-08-01), Shear et al.
patent: 2008/0077531 (2008-03-01), Shear et al.
patent: 0 128 672 (1984-12-01), None
patent: 0 399 822 (1990-11-01), None
patent: 0 421 409 (1991-04-01), None
patent: 0 565 314 (1993-10-01), None
patent: 2264796 (1993-09-01), None
patent: WO 90/02382 (1990-03-01), None
patent: WO 92/22870 (1992-12-01), None
patent: WO 94/03859 (1994-02-01), None
patent: WO 94/06103 (1994-03-01), None
patent: WO 96/27155 (1996-09-01), None
“Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme Via Encryption”, IBM Technical Disclosure Bulletin, vol. 37, No. 3, Mar. 1, 1994, pp. 413-417.
“Transformer Rules Strategy for Software Distribution Mechanism-Support Products”, IBM Technical Disclosure Bulletin, vol. 37, No. 48, Apr. 1994, pp. 523-525.
Final Office Action dated Apr. 19, 2006 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Final Office Action dated Jan. 4, 2000 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Final Office Action dated Jan. 5, 2009 issued in related U.S. Appl. No. 11/894,502, filed Aug. 20, 2007, Shear et al.
Mori, R. et al., “Superdistribution: The Concept and the Architecture,” The Transactons of the EIEICE, V, E73, No. 7, Tokyo, Japan, Jul. 1990, pp. 1133-1146.
Non-Final Office Action dated Aug. 1, 2005 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Non-Final Office Action dated Feb. 20, 2009 issued in related U.S. Appl. No. 11/842,138, filed Aug. 21, 2007, Shear et al.
Non-Final Office Action dated Feb. 20, 2009 issued in related U.S. Appl. No. 11/894,327, filed Aug. 20, 2007, Shear et al.
Non-Final Office Action dated Jan. 5, 2001 issued in related U.S. Appl. No. 09/678,830, filed Oct. 4, 2000, Shear et al.
Non-Final Office Action dated Jul. 24, 2008 issued in related U.S. Appl. No. 11/894,502, filed Aug. 20, 2007, Shear et al.
Non-Final Office Action dated Jul. 9, 1999 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Non-Final Office Action dated Nov. 25, 2008 issued in related U.S. Appl. No. 11/894,339, filed Aug. 20, 2007, Shear et al.
Non-Final Office Action dated Oct. 15, 1998 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Notice of Allowance dated Jul. 3, 2000 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Notice of Allowance dated Jun. 20, 2006 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Notice of Allowance dated Mar. 13, 2009 issued in related U.S. Appl. No. 11/894,339, filed Aug. 20, 2007, Shear et al.
Notice of Allowance dated May 8, 2001 issued in related U.S. Appl. No. 09/678,830, filed Oct. 4, 2000, Shear et al.
Siuda, K., “Security Services in Telecommunications Networks,” Seminar: Mapping New Applications Onto New Technologies, edited by B. Plattner and P. Gunzburger; Zurich, Mar. 8-10, 1988, pp. 45-52.
Advisory Action dated Jun. 1, 2006 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Office Action dated Sep. 14, 2009 issued in related U.S. Appl. No. 11/454,072, filed Jun. 14, 2006, Shear et al.
Office Action dated Dec. 15, 2009 issued in related U.S. Appl. No. 11/781,062, filed Jul. 20, 2007, Shear et al.
Office Action dated Oct. 29, 2009 issued in related U.S. Appl. No. 11/841,555, filed Aug. 20, 2007, Shear et al.
Office Action dated Sep. 29, 2009 issued in related U.S. Appl. No. 11/841,600, filed Aug. 20, 2007, Shear et al.
Office Action mailed Oct. 26, 2009 issued in related U.S. Appl. No. 11/841,446, filed Aug. 20, 2007, Shear et al.
Office Action dated Dec. 9, 2009 issued in related U.S. Appl. No. 11/894,327, filed Aug. 20, 2007, Shear et al.
Notice of Allowance dated Jan. 11, 2010 issued in related U.S. Appl. No. 11/894,327, filed Aug. 20, 2007, Shear et al.
Notice of Allowance dated May 29, 2009 issued in related U.S. Appl. No. 11/894,339, filed Aug. 20, 2007, Shear et al.
Notice of Allowance dated May 29, 2009 issued in related U.S. Appl. No. 11/894,502, filed Aug. 20, 2007, Shear et al.
Office Action dated Dec. 1, 2009 issued in related U.S. Appl. No. 11/842,138, filed Aug. 21, 2007, Shear et al.
Office Action dated Oct. 1, 2009 issued in related U.S. Appl. No. 11/978,962, filed Oct. 29, 2007, Shear et al.
Examination Report dated Nov. 30, 1999 issued in related Australian Application No. 36815/97.
Examination Report dated Nov. 29, 2004 issued in related Australian Application No. 2003203649.
Examination Report dated Feb. 28, 2007 issued in related Australian Application No. 2004240210.
Statement of Grounds and Particulars in Support of Opposition dated Jul. 16, 2003 in related Australian Application No. 57835/01.
Comments Filed by Opponent dated Aug. 21, 2003 in related Australian Application No. 57835/01.
Examiners First Report on Voluntary Request to Amend dated Sep. 15, 2003 in related Australian Application No. 57835/01.
Decision of a Delagate of the Commistion of Patents dated Apr. 20, 2004 in related Australian Application No. 57835/01.
Denning, D.E.R., “Cryptography and Data Security,” Addison-Wesley Publishing Company, 1982, Reprinted with corrections, Jan. 1983.
Department of Defense Standard, “Department of Defense Trusted Computer System Evaluation Criteria,” Dec. 1985, pp. 1-72.
Everett, D.B., “Smart Card Tutorial-Part 1,” publisehd in sections between Sep. 1992 and Sep. 1994 at http://www.smartcard.co.uk/resources/tutorial.
Fuchsberger et al., “Public-key Cryptography on Smart Cards,” Lecture Notes in Computer Science, p. 250-269, 1995.
Gasser, M. et al., “The Digital Distributed System Security Architecture,” Reprint from the Proceedings of 1989 National Computer Security Conference, 1

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods using cryptography to protect secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods using cryptography to protect secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods using cryptography to protect secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2634757

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.