Use of kernel authorization data to maintain security in a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07552326

ABSTRACT:
A system to manage and control usage rights for cryptographic keys. A kernel process is provided with secure and exclusive authorization to access certain keys in a key hierarchy. Special authorization is required for other processes or users to access keys used by the kernel. A persistent storage area is used to hold a Kernel Authorization Data field for the root key and/or other keys used by the kernel or other specialized processes. The authorization data, and the keys it protects, can be used to protect other portions of, or the entire, key structure. The persistent storage area is reserved in a TPM or similar security hardware.

REFERENCES:
patent: 5778212 (1998-07-01), Dehnert
patent: 6334213 (2001-12-01), Le
patent: 6708330 (2004-03-01), Moberg
patent: 6859932 (2005-02-01), Shann
patent: 7117371 (2006-10-01), Parthasarathy
patent: 7143289 (2006-11-01), Denning
patent: 7376977 (2008-05-01), Jindal
patent: 2002/0112158 (2002-08-01), Golchikov
patent: 2003/0188179 (2003-10-01), Challener et al.
patent: 2004/0015884 (2004-01-01), Shann
patent: 2005/0132031 (2005-06-01), Sailer
patent: 2005/0204205 (2005-09-01), Ring
patent: 2005/0262502 (2005-11-01), Lari
patent: 2005/0273602 (2005-12-01), Wilson
patent: 2006/0047958 (2006-03-01), Morais
patent: 2007/0006150 (2007-01-01), Walmsley
Eric Youngdale, “Kernal Korner: The ELF Object File Format: Introduction”, Specialized System Consultant, Inc. Linux Journal, vol. 95, Issues 12es, pp. 1-5.
Daniel Polistchuck, “Writing custom data to executable files in Windows and Linuz”, Nov. 26, 2001, Retrieved from <http://dn.codegear.com>, pp. 1-6.
“Expanded Executable Loadable Format Operating Header”, IBM Technical Disclosure Bulletin, Sep. 1995, pp. 1-5.
ITS Committee, Tool Interface Standard (TIS) Executable and Linking Format(ELF) Specification Version 1.2, Retrieved from <http://www.x89.org/ftp/manuals/tools/elf.pdf>, pp. 1-106.
“Executable and Linkable Format (ELF)”, Retrieved from <http://skyfree.org/linux/references/ELF—Format.pdf>, pp. 1-60.
Marius Van Oers, “Linux Viruses—EFL File Format”, Virus Bulletin Conference, Sep. 2000, pp. 1-20.
“Object Files”, Retreived from <http://www.iecc.com/linker/linker03.html>, pp. 1-35.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Use of kernel authorization data to maintain security in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Use of kernel authorization data to maintain security in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Use of kernel authorization data to maintain security in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4142740

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.