Systems and methods using cryptography to protect secure...

Electrical computers and digital processing systems: support – Digital data processing system initialization or configuration – Loading initialization program

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S156000, C713S187000, C713S194000, C705S057000, C726S022000, C726S030000, C711S164000, C717S178000

Reexamination Certificate

active

07581092

ABSTRACT:
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.

REFERENCES:
patent: 4672572 (1987-06-01), Alsberg
patent: 4799156 (1989-01-01), Shavit et al.
patent: 4823264 (1989-04-01), Deming
patent: 4930073 (1990-05-01), Cina, Jr.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5111390 (1992-05-01), Ketcham
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5343527 (1994-08-01), Moore
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5479509 (1995-12-01), Ugon
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5692047 (1997-11-01), McManis
patent: 5757914 (1998-05-01), McManis
patent: 6141753 (2000-10-01), Zhao et al.
patent: 6157721 (2000-12-01), Shear et al.
patent: 6292569 (2001-09-01), Shear et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6701433 (2004-03-01), Schell et al.
patent: 6983371 (2006-01-01), Hurtado et al.
patent: 7133846 (2006-11-01), Ginter et al.
patent: 7152045 (2006-12-01), Hoffman
patent: 7165174 (2007-01-01), Ginter et al.
patent: 7405724 (2008-07-01), Drummond et al.
patent: 2006/0248016 (2006-11-01), Ginter et al.
patent: 2008/0077531 (2008-03-01), Shear et al.
patent: 0 128 672 (1984-12-01), None
patent: 0 399 822 (1990-11-01), None
patent: 0 421 409 (1991-04-01), None
patent: 0 565 314 (1993-10-01), None
patent: 2264796 (1993-09-01), None
patent: WO 90/02382 (1990-03-01), None
patent: WO 92/22870 (1992-12-01), None
patent: WO 94/03859 (1994-02-01), None
patent: WO 94/06103 (1994-03-01), None
“Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme Via Encryption”, IBM Technical Disclosure Bulletin, vol. 37, No. 3, Mar. 1, 1994, pp. 413-417.
“Transformer Rules Strategy for Software Distribution Mechanism-Support Products”, IBM Technical Disclosure Bulletin, vol. 37, No. 48, Apr. 1994, pp. 523-525.
Final Office Action dated Apr. 19, 2006 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Final Office Action dated Jan. 4, 2000 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Mori, R. et al., “Superdistribution: The Concept and the Architecture,” The Transactons of the Eieice, V, E73, No. 7, Tokyo, Japan, Jul. 1990, pp. 1133-1146.
Non-Final Office Action dated Aug. 1, 2005 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Non-Final Office Action dated Feb. 20, 2009 issued in related U.S. Appl. No. 11/842,138, filed Aug. 21, 2007, Shear et al.
Non-Final Office Action dated Feb. 20, 2009 issued in related U.S. Appl. No. 11/894,327, filed Aug. 20, 2007, Shear et al.
Non-Final Office Action dated Jan. 5, 2001 issued in related U.S. Appl. No. 09/678,830, filed Oct. 4, 2000, Shear et al.
Non-Final Office Action dated Jul. 9, 1999 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Non-Final Office Action dated Nov. 25, 2008 issued in related U.S. Appl. No. 11/894,339, filed Aug. 20, 2007, Shear et al.
Non-Final Office Action dated Oct. 15, 1998 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Notice of Allowance dated Jul. 3, 2000 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Notice of Allowance dated Jun. 20, 2006 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Notice of Allowance dated Mar. 13, 2009 issued in related U.S. Appl. No. 11/894,339, filed Aug. 20, 2007, Shear et al.
Notice of Allowance dated May 8, 2001 issued in related U.S. Appl. No. 09/678,830, filed Oct. 4, 2000, Shear et al.
Siuda, K., “Security Services in Telecommunications Networks,” Seminar: Mapping New Applications Onto New Technologies, edited by B. Plattner and P. Gunzburger; Zurich, Mar. 8-10, 1988, pp. 45-52.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods using cryptography to protect secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods using cryptography to protect secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods using cryptography to protect secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4131831

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.