Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2004-11-08
2009-10-06
Korzuch, William R (Department: 2431)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S165000, C713S168000, C713S171000, C713S181000, C713S183000, C726S004000, C726S005000, C726S017000, C726S034000, C380S259000, C380S277000, C380S284000, C380S028000
Reexamination Certificate
active
07600134
ABSTRACT:
A method for theft deterrence of a computer system is disclosed. The computer system includes a trusted platform module (TPM) and storage medium. The method comprises providing a binding key in the TPM; and providing an encrypted symmetric key in the storage medium. The method further includes providing an unbind command to the TPM based upon an authorization to provide a decrypted symmetric key; and providing the decrypted symmetric key to the secure storage device to allow for use of the computer system. Accordingly, by utilizing a secure hard disk drive (HDD) that requires a decrypted key to function in conjunction with a TPM, a computer if stolen is virtually unusable by the thief. In so doing, the risk of theft of the computer is significantly reduced.
REFERENCES:
patent: 5657470 (1997-08-01), Fisherman et al.
patent: 5748744 (1998-05-01), Levy et al.
patent: 6272632 (2001-08-01), Carman et al.
patent: 6463537 (2002-10-01), Tello
patent: 6487646 (2002-11-01), Adams et al.
patent: 6654890 (2003-11-01), Girard
patent: 6725382 (2004-04-01), Thompson et al.
patent: 7010691 (2006-03-01), Wheeler et al.
patent: 7117376 (2006-10-01), Grawrock
patent: 7281125 (2007-10-01), Challener et al.
patent: 7290288 (2007-10-01), Gregg et al.
patent: 7299354 (2007-11-01), Khanna et al.
patent: 7380119 (2008-05-01), Bade et al.
patent: 7421588 (2008-09-01), Challener et al.
patent: 7430668 (2008-09-01), Chen et al.
patent: 2001/0005886 (2001-06-01), Stratton et al.
patent: 2002/0087877 (2002-07-01), Grawrock
patent: 2003/0097585 (2003-05-01), Girard
patent: 2003/0188179 (2003-10-01), Challener et al.
patent: 2003/0212911 (2003-11-01), Challener et al.
patent: 2003/0226040 (2003-12-01), Challener et al.
patent: 2004/0151319 (2004-08-01), Proudler
patent: 2005/0060561 (2005-03-01), Pearson et al.
patent: 2005/0111664 (2005-05-01), Ritz et al.
patent: 2005/0149729 (2005-07-01), Zimmer et al.
patent: 2005/0216753 (2005-09-01), Dailey et al.
patent: 2007/0226496 (2007-09-01), Maletsky et al.
patent: 2009/0064292 (2009-03-01), Carter et al.
patent: 2439838 (2008-01-01), None
Stumpf et al, Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques, 2008, IEEE, pp. 1-9.
Barrett et al, Frameworks Built on the Trusted Platform Module, 2006, IEEE, pp. 59-62.
David Lutz, Federation Payments using SAML Tokens with Trusted Platform Modules, 2007, IEEE, pp. 363-368.
Guan et al, Efficient Identity-Based Key Issue with TPM, 2008, IEEE, pp. 2354-2359.
Catherman Ryan C.
Challener David C.
Hoff James P.
Pennisi Joseph M.
Springfield Randall S.
Korzuch William R
Lenovo ( Singapore) Pte. Ltd.
Moorthy Aravind K
Munoz-Bustamante Carlos
Sawyer Law Grooup
LandOfFree
Theft deterrence using trusted platform module authorization does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Theft deterrence using trusted platform module authorization, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Theft deterrence using trusted platform module authorization will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4084383