Electrical computers and digital processing systems: support – Digital data processing system initialization or configuration – Loading initialization program
Reexamination Certificate
2007-08-20
2009-08-25
Moise, Emmanuel L (Department: 2437)
Electrical computers and digital processing systems: support
Digital data processing system initialization or configuration
Loading initialization program
C713S156000, C713S187000, C713S194000, C705S057000, C726S022000, C726S030000, C711S164000, C717S178000
Reexamination Certificate
active
07581092
ABSTRACT:
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.
REFERENCES:
patent: 4672572 (1987-06-01), Alsberg
patent: 4799156 (1989-01-01), Shavit et al.
patent: 4823264 (1989-04-01), Deming
patent: 4930073 (1990-05-01), Cina, Jr.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5111390 (1992-05-01), Ketcham
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5343527 (1994-08-01), Moore
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5479509 (1995-12-01), Ugon
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5692047 (1997-11-01), McManis
patent: 5757914 (1998-05-01), McManis
patent: 6141753 (2000-10-01), Zhao et al.
patent: 6157721 (2000-12-01), Shear et al.
patent: 6292569 (2001-09-01), Shear et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6701433 (2004-03-01), Schell et al.
patent: 6983371 (2006-01-01), Hurtado et al.
patent: 7133846 (2006-11-01), Ginter et al.
patent: 7152045 (2006-12-01), Hoffman
patent: 7165174 (2007-01-01), Ginter et al.
patent: 7405724 (2008-07-01), Drummond et al.
patent: 2006/0248016 (2006-11-01), Ginter et al.
patent: 2008/0077531 (2008-03-01), Shear et al.
patent: 0 128 672 (1984-12-01), None
patent: 0 399 822 (1990-11-01), None
patent: 0 421 409 (1991-04-01), None
patent: 0 565 314 (1993-10-01), None
patent: 2264796 (1993-09-01), None
patent: WO 90/02382 (1990-03-01), None
patent: WO 92/22870 (1992-12-01), None
patent: WO 94/03859 (1994-02-01), None
patent: WO 94/06103 (1994-03-01), None
“Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme Via Encryption”, IBM Technical Disclosure Bulletin, vol. 37, No. 3, Mar. 1, 1994, pp. 413-417.
“Transformer Rules Strategy for Software Distribution Mechanism-Support Products”, IBM Technical Disclosure Bulletin, vol. 37, No. 48, Apr. 1994, pp. 523-525.
Final Office Action dated Apr. 19, 2006 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Final Office Action dated Jan. 4, 2000 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Mori, R. et al., “Superdistribution: The Concept and the Architecture,” The Transactons of the Eieice, V, E73, No. 7, Tokyo, Japan, Jul. 1990, pp. 1133-1146.
Non-Final Office Action dated Aug. 1, 2005 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Non-Final Office Action dated Feb. 20, 2009 issued in related U.S. Appl. No. 11/842,138, filed Aug. 21, 2007, Shear et al.
Non-Final Office Action dated Feb. 20, 2009 issued in related U.S. Appl. No. 11/894,327, filed Aug. 20, 2007, Shear et al.
Non-Final Office Action dated Jan. 5, 2001 issued in related U.S. Appl. No. 09/678,830, filed Oct. 4, 2000, Shear et al.
Non-Final Office Action dated Jul. 9, 1999 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Non-Final Office Action dated Nov. 25, 2008 issued in related U.S. Appl. No. 11/894,339, filed Aug. 20, 2007, Shear et al.
Non-Final Office Action dated Oct. 15, 1998 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Notice of Allowance dated Jul. 3, 2000 issued in related U.S. Appl. No. 08/689,754, filed Aug. 12, 1996, Shear et al.
Notice of Allowance dated Jun. 20, 2006 issued in related U.S. Appl. No. 09/925,072, filed Aug. 6, 2001, Shear et al.
Notice of Allowance dated Mar. 13, 2009 issued in related U.S. Appl. No. 11/894,339, filed Aug. 20, 2007, Shear et al.
Notice of Allowance dated May 8, 2001 issued in related U.S. Appl. No. 09/678,830, filed Oct. 4, 2000, Shear et al.
Siuda, K., “Security Services in Telecommunications Networks,” Seminar: Mapping New Applications Onto New Technologies, edited by B. Plattner and P. Gunzburger; Zurich, Mar. 8-10, 1988, pp. 45-52.
Shear Victor H.
Sibert W. Olin
Van Wie David M.
Callahan Paul
Finnegan Henderson Farabow Garrett & Dunner LLP
Intertrust Technologies Corporation
Moise Emmanuel L
LandOfFree
Systems and methods using cryptography to protect secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods using cryptography to protect secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods using cryptography to protect secure... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4131831