Tamper-resistant trusted Java virtual machine and method of...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S164000, C713S187000, C717S118000, C717S146000

Reexamination Certificate

active

07747877

ABSTRACT:
A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.

REFERENCES:
patent: 5651111 (1997-07-01), McKeeman et al.
patent: 5692047 (1997-11-01), McManis
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5940513 (1999-08-01), Aucsmith et al.
patent: 6067575 (2000-05-01), McManis et al.
patent: 6092147 (2000-07-01), Levy et al.
patent: 6961855 (2005-11-01), Rich et al.
patent: 2001/0037450 (2001-11-01), Metlitski et al.
patent: 2002/0147763 (2002-10-01), Lee et al.
patent: 2002/0184520 (2002-12-01), Bush et al.
patent: 2002/0194482 (2002-12-01), Griffin et al.
patent: 2002/0199100 (2002-12-01), Nenashev
patent: 2003/0074567 (2003-04-01), Charbonneau
patent: 2003/0135746 (2003-07-01), Abbott et al.
patent: 2005/0204126 (2005-09-01), Watson
patent: 0875814 (2007-03-01), None
Tal Garfinkel et al “A virtual Machine-Based Platform for Trusted Computing” SOSP '03, Oct. 19-22, 2003, Bolton Landing, New York, USA.
Scott Oaks, “Java Security”, May 2001, O'Reilly, Seabatopol, CA 95472, XP002321663, pp. 261-310.
Java(TM) Platform Debugger Architecture—Architecture Overview, [online]; [retrieved on Dec. 18, 2008]; retrieved from the Internet http://java.sun.com/j2se/1.3/docs/guide/jpda/architecture.html.
Java(TM) Platform Debugger Architecture—Overview, [online]; [retrieved on Dec. 18, 2008]; retrieved from the Internet http://java.sun.com/j2se/1.5.0/docs/guide/jpda/jpda.html.
Extensible Security Architectures for Java, [online]; [retrieved on Dec. 18, 2008]; retrieved from the Internet http://www.cs.princeton.edu/sip/pub/sosp97.pdf.
Analyzing the Security of an Existing Computer System, [online]; [retrieved on Dec. 18, 2008]; retrieved from the Internet http:/
ob.cs.ucdavis.edu/bishop/papers/1986-fjcc/secsystem.pdf.
Scott Oaks, “Java Security”, May 2001, O'Reilly, Seabatopol, CA 95472, XP002321663, pp. 183-198.
“Microsoft Security Chip Open to Discussion”, PCWorld, Jul. 8, 2002 http://pcworld.com/printable/article/id,102473/printable.html.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Tamper-resistant trusted Java virtual machine and method of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Tamper-resistant trusted Java virtual machine and method of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tamper-resistant trusted Java virtual machine and method of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4196558

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.