Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2004-07-15
2009-06-23
Zand, Kambiz (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
Reexamination Certificate
active
07552326
ABSTRACT:
A system to manage and control usage rights for cryptographic keys. A kernel process is provided with secure and exclusive authorization to access certain keys in a key hierarchy. Special authorization is required for other processes or users to access keys used by the kernel. A persistent storage area is used to hold a Kernel Authorization Data field for the root key and/or other keys used by the kernel or other specialized processes. The authorization data, and the keys it protects, can be used to protect other portions of, or the entire, key structure. The persistent storage area is reserved in a TPM or similar security hardware.
REFERENCES:
patent: 5778212 (1998-07-01), Dehnert
patent: 6334213 (2001-12-01), Le
patent: 6708330 (2004-03-01), Moberg
patent: 6859932 (2005-02-01), Shann
patent: 7117371 (2006-10-01), Parthasarathy
patent: 7143289 (2006-11-01), Denning
patent: 7376977 (2008-05-01), Jindal
patent: 2002/0112158 (2002-08-01), Golchikov
patent: 2003/0188179 (2003-10-01), Challener et al.
patent: 2004/0015884 (2004-01-01), Shann
patent: 2005/0132031 (2005-06-01), Sailer
patent: 2005/0204205 (2005-09-01), Ring
patent: 2005/0262502 (2005-11-01), Lari
patent: 2005/0273602 (2005-12-01), Wilson
patent: 2006/0047958 (2006-03-01), Morais
patent: 2007/0006150 (2007-01-01), Walmsley
Eric Youngdale, “Kernal Korner: The ELF Object File Format: Introduction”, Specialized System Consultant, Inc. Linux Journal, vol. 95, Issues 12es, pp. 1-5.
Daniel Polistchuck, “Writing custom data to executable files in Windows and Linuz”, Nov. 26, 2001, Retrieved from <http://dn.codegear.com>, pp. 1-6.
“Expanded Executable Loadable Format Operating Header”, IBM Technical Disclosure Bulletin, Sep. 1995, pp. 1-5.
ITS Committee, Tool Interface Standard (TIS) Executable and Linking Format(ELF) Specification Version 1.2, Retrieved from <http://www.x89.org/ftp/manuals/tools/elf.pdf>, pp. 1-106.
“Executable and Linkable Format (ELF)”, Retrieved from <http://skyfree.org/linux/references/ELF—Format.pdf>, pp. 1-60.
Marius Van Oers, “Linux Viruses—EFL File Format”, Virus Bulletin Conference, Sep. 2000, pp. 1-20.
“Object Files”, Retreived from <http://www.iecc.com/linker/linker03.html>, pp. 1-35.
Liu Zhengrong
Ludtke Harold Aaron
Shinozaki Ikuo
Sony Corporation
Sony Electronics Inc.
Trellis IP Law Group
Wyszynski Aubrey H
Young Brian N.
LandOfFree
Use of kernel authorization data to maintain security in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Use of kernel authorization data to maintain security in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Use of kernel authorization data to maintain security in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4142740