Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2006-12-19
2006-12-19
Barrón, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C726S026000
Reexamination Certificate
active
07152165
ABSTRACT:
Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
REFERENCES:
patent: 4309569 (1982-01-01), Merkle
patent: 4827508 (1989-05-01), Shear
patent: 4977594 (1990-12-01), Shear
patent: 5010571 (1991-04-01), Katznelson
patent: 5050213 (1991-09-01), Shear
patent: 5136648 (1992-08-01), Olson et al.
patent: 5247575 (1993-09-01), Sprague et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5394469 (1995-02-01), Nagel et al.
patent: 5410598 (1995-04-01), Shear
patent: 5646997 (1997-07-01), Barton
patent: 5713018 (1998-01-01), Chan
patent: 5794252 (1998-08-01), Bailey et al.
patent: 5826268 (1998-10-01), Schaefer et al.
patent: 5862357 (1999-01-01), Hagersten et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5940504 (1999-08-01), Griswold
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5999949 (1999-12-01), Crandall
patent: 6016490 (2000-01-01), Watanabe et al.
patent: 6044370 (2000-03-01), Anfindsen
patent: 6112181 (2000-08-01), Shear et al.
patent: 6157721 (2000-12-01), Shear et al.
patent: 6185683 (2001-02-01), Ginter et al.
patent: 6278791 (2001-08-01), Honsinger et al.
patent: 2001/0042043 (2001-11-01), Shear et al.
patent: A-36815/97 (1997-04-01), None
patent: A-36840/97 (1997-04-01), None
patent: A-36840/97 (1998-02-01), None
patent: 0 715 246 (1996-06-01), None
patent: WO 96/27155 (1996-09-01), None
patent: WO 97/43761 (1997-11-01), None
patent: WO 98/09209 (1998-03-01), None
patent: WO 98/10381 (1998-03-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 99/14652 (1999-03-01), None
patent: WO 99/48296 (1999-09-01), None
Paul Ammann, et al.,Surviving Information Warfare Attacks On Databases, Proc. 1997, IEEE Symp. on Security and Privacy, May 4-7, 1997, pp. 164-174.
Mihir Bellare, et al.,Forward Integrity for Secure Audit Logs, Technical Report, Computer Science and Engineering Department, University of California at San Diego, 1997, pp. 1-16.
Trevor Blackwell, et al.,Heuristic Cleaning Algorithms in Log-Structured File Systems. Proc. of the 1995 USENIX Technical Conference, Jan. 16-20, 1995, pp. 277-288.
Matt Blaze,A Cryptographic File System for Unix, First ACM Conference on Communications and Computing Security, Nov. 3-5, 1993, 8 pages.
Manuel Blum, et al.,Checking the Correctness of Memories, Proc. IEEE Conf. on Foundations of Computer Science, 1991, pp. 90-99.
Miguel Castro, et al.,Practical Byzantine Fault Tolerance, Third Symposium on Operating Systems Design and Implementation, 1999, pp. 173-186.
Frederick B. Cohen,Operating System Protection Through Program Evolution, Computers & Security, 12(6), Elsevier Science Publishers, Ltd., 1993, pp. 565-584.
Kevin Fu, et al.,Fast and Secure Distributed Read-Only File System, Proc. Symposium on Operating System Design and Implementation, 13(16), Aug. 30, 2000, pp. 1-16.
Juan A. Garay, et al.,Secure Distributed Storage and Retrieval, 11th Intl. Workshop on Distributed Algorithms, 1997, pp. 275-289.
Norman C. Hutchinson, et al.,Logical vs. Physical File System Backup, Proc. of the 3rdSymp. on Operating System Design and Implementation, Feb., 1999, 12 pages.
Oliver Kommerling, et al.,Design Principles for Tamper-Resistant Smartcard Processors. Proc. of the USENIX Workshop on Smartcard Technology, May 10-11, 1999, pp. 9-20.
Hugo Krawczyk,Distributed Fingerprints and Secure Information Dispersal, Proc. of the Twelfth Annual ACM Symp. on Principles of Distributed Computing, Aug. 15-18, 1993, pp. 207-218.
Per-Ake Larson,Dynamic Hash Tables, Communications of the ACM, vol. 31, No. 4, Apr., 1988, pp. 446-457.
David B. Lomet,The Case for Log Structuring in Database Systems, Proceedings of the 6thInt'l Workshop on High Performance Transaction Systems, 1995, pp. 1-5.
Ralph C. Merkle,Protocols for Public Key Cryptosystems, Proc. of the 1980 Symposium on Security and Privacy, IEEE, Catalog No. 80, 1980, pp. 122-134
Niels Provos,Encrypting Virtual Memory, Proc. of the 9thUSENIX Security Symposium, Aug. 14-17, 2000, 10 pages.
Michael O. Rabin,Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance, Journal of the ACM, vol. 36, No. 2, Apr., 1989, pp. 335-348.
Mendel Rosenblum, et al.,The Design and Implementation of a Log-Structured File System, Proc. of the 13thACM Symposium on Operating Systems Principles, 1991, pp. 1-15.
Mendel Rosenblum, et al.The Design and Implementation of a Log-Structured File System, ACM Transactions on Computer Systems, vol. 10, No. 1, Feb., 1992, pp. 26-52.
Bruce Schneier, et al.,Cryptographic Support for Secure Logs on Untrusted Machines, Proc. of the 7thUSENIX Security Symposium, Jan. 26-29, 1998, 11 pages.
Bruce Schneier,Applied Cryptography, Second Edition, John Wiley & Sons, 1996, pp. 233-482.
Margo Seltzer, et al.,An Implementation of a Log-Structured File System for Unix, Proceedings of the 1993 Winter USENIX Conference, Jan. 25-29, 1993, pp. 307-326.
Sean W. Smith, et al.,Using a High-Performance, Programmable Secure Coprocessor, Second Intl. Conf. on Financial Cryptography, Feb. 23-25, 1998, pp. 73-89.
Tatu Ylonen,Shadow Paging is Feasible, Licentiate's Thesis, Helsinki University of Technology, Apr. 27, 1994, pp. 1-149.
Ross Anderson, et al., “Tamper Resistance—a Cautionary Note”, The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, Nov. 18-21, 1996, pp. 1-11.
M.P. Atkinson, et al., “The Computer Journal”, The Computer Society, vol. 26, No. 4, Nov. 1983, 6 pages.
David Aucsmith, “Tamper Resistant Software: An Implementation”, First International Workshop, Cambridge, United Kingdom, May 30-Jun. 1, 1996, pp. 317-333.
Mihir Bellare, et al., “Forward Integrity for Secure Audit Logs”, Dept. of Computer Science and Engineering, University of California San Diego, Nov. 23, 1997, 16 pages.
Michael J. Carey, et al., “The Exodus Extensible DBMS Project: An Overview”, Computer Sciences Department, University of Wisconsin, Madison, Wisconsin, pp. 1-26.
Arvola Chan, et al., “The Implementation of An Integrated Concurrency Control and Recovery Scheme”, International Conference on Management of Data, ACM SIGMOD, Jun. 2-4, 1982, pp. 184-191.
C. Collberg, “Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs”, ACM Press, ACM SIGPLAN-SIGACT, pp. 184-196.
Wiebren de Jonge, et al., “The Logical Disk: A New Approach to Improving File Systems”, Dept. of Mathematics and Computer Science, Vrije Universiteit, Amsterdam, 14 pages.
J. Gray, “The Benchmark Handbook for Database and Transaction Proceeding Systems”, Morgan Kaufmann, 1991.
Jim Gray, et al., “The Recovery Management of the System R Database Manager”, ACM Computing Surveys, vol. 13, No. 2, Jun. 1981, pp. 223-242.
J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kaufmann, 1993.
C.A.R. Hoare, et al., “An Operating System Structuring Concept”, Communications of the ACM, 1974, pp. 549-557.
Deborah Jing-Hwa Hwang, “Function-Based Indexing for Object Oriented Databases”, Ph.D. Thesis, MIT, Feb. 1994 172 pages.
A. Kemper, et al., “Function Materialization in Object Bases”, In Proceedings of the ACM SIGMOD International Conference on Management of Data, May 29-31, 1991, pp. 258-267.
Charles Lamb, et al.,“The Objectstore Database System”, Communications of the ACM, vol. 34, No. 10, Oct. 1991, pp. 50-63.
B. Liskov, et al., “Safe and Efficient Sharing of Persistent Objects in Thor”, ACM SIGMOD, vol. 25, Issue 2, Jun. 1996, pp. 318-329.
David Maier, et al., “Ind
Maheshwari Umesh
Sibert W. Olin
Vingralek Radek
Barrón Jr. Gilberto
Finnegan Henderson Farabow Garrett & Dunner L.L.P.
Gurshman G.
Intertrust Technologies Corp.
LandOfFree
Trusted storage systems and methods does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Trusted storage systems and methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trusted storage systems and methods will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3655448