Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-04-25
2006-04-25
Darrow, Justin T. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S189000, C713S152000
Reexamination Certificate
active
07036022
ABSTRACT:
A method for executing trusted commands, in which a trusted command is first received from a user at a user terminal and parsed by untrusted code; then passed to a trusted computing base for execution. The trusted computing base displays some indication of what is to be done back to the user for confirmation. Confirmation of the commands prevents unauthorized modification of the commands and increases system confidence. A randomly (or pseudo-randomly) generated process identifier is employed to verify the existence of a trusted path.
REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4005386 (1977-01-01), Seki et al.
patent: 4183085 (1980-01-01), Roberts et al.
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4253145 (1981-02-01), Goldberg
patent: 4310720 (1982-01-01), Check, Jr.
patent: 4315101 (1982-02-01), Atalla
patent: 4328542 (1982-05-01), Anastas et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4430728 (1984-02-01), Beitel et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4486828 (1984-12-01), Kitamura et al.
patent: 4488217 (1984-12-01), Binder et al.
patent: 4531023 (1985-07-01), Levine
patent: 4584639 (1986-04-01), Hardy
patent: 4593353 (1986-06-01), Pickholtz
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4669043 (1987-05-01), Kaplinsky
patent: 4677546 (1987-06-01), Freeman et al.
patent: 4677670 (1987-06-01), Henderson, Jr.
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4742447 (1988-05-01), Duvall et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4751669 (1988-06-01), Sturgis et al.
patent: 4754326 (1988-06-01), Kram et al.
patent: 4754395 (1988-06-01), Weisshaar et al.
patent: 4771461 (1988-09-01), Matyas
patent: 4794515 (1988-12-01), Hornung
patent: 4797853 (1989-01-01), Savage et al.
patent: 4799061 (1989-01-01), Abraham et al.
patent: 4799153 (1989-01-01), Hann et al.
patent: 4829469 (1989-05-01), Germaine et al.
patent: 4858117 (1989-08-01), DiChiara et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4918653 (1990-04-01), Johri et al.
patent: 4926476 (1990-05-01), Covey
patent: 4945468 (1990-07-01), Carson et al.
patent: 4962533 (1990-10-01), Krueger et al.
patent: 5073933 (1991-12-01), Rosenthal
patent: 326669 (1989-08-01), None
National Institute of Standards and Technology, “DES Modes of Operation,” Dec. 2, 1980, FIPS PUB 81. Retrieved from the Internet:<http://www.itl.nist.gov/fipspubs/fip81.htm>.
Microsoft Press Computer Dictionary, 1997, Microsoft Corp., 3rd Ed., p. 101, 355.
Wiseman, et al.,The Trusted Path between SMITE and the User, IEEE Symposium on Security and Privacyat 147-155 (1988) (published in the U.S.A.).
Ames et al.,Security Kernel Design and Implementation: An Introduction, IEEE Computer, pp. 14-22 (Jul. 1983).
Krager et al.,A VMM Security Kernel for the VAX Architecture, (unpublished draft of Jan. 11, 1990).
Atkins, D.E.,Design of the Arithmetic Units of ILLIAC III: Use of Redundancy and Higher Radix Methods, IE Transactions on Computers, vol. C-19, No. 8, Aug. 1970, pp. 720-733.
Dunford,FILER, Version 2.20 User Documentation, (May 14, 1986).
McCauley et al.,KSOS: The Design of a Secure Operating System, Version 1.2 (1979),UNIX Operating System.
Dept. of Defense, “Dept. of Defense Trusted Computer System Evaluation Criteria,” Dec. 26, 1985. Retrieved from the Internet:<URL: http://csrc.ncsl.nist.gov/secpubs/rainbow/std001.txt>.
Casey, Jr. Thomas Andrew
Gasser Morrie
Hall Judith Shelhorse
Kahn Clifford Earl
Kendall Leslie Richard
Darrow Justin T.
Hewlett--Packard Development Company, L.P.
LandOfFree
Verification of trusted-path commands does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Verification of trusted-path commands, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Verification of trusted-path commands will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3553187