Verification of trusted-path commands

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C713S152000

Reexamination Certificate

active

07036022

ABSTRACT:
A method for executing trusted commands, in which a trusted command is first received from a user at a user terminal and parsed by untrusted code; then passed to a trusted computing base for execution. The trusted computing base displays some indication of what is to be done back to the user for confirmation. Confirmation of the commands prevents unauthorized modification of the commands and increases system confidence. A randomly (or pseudo-randomly) generated process identifier is employed to verify the existence of a trusted path.

REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4005386 (1977-01-01), Seki et al.
patent: 4183085 (1980-01-01), Roberts et al.
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4253145 (1981-02-01), Goldberg
patent: 4310720 (1982-01-01), Check, Jr.
patent: 4315101 (1982-02-01), Atalla
patent: 4328542 (1982-05-01), Anastas et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4430728 (1984-02-01), Beitel et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4486828 (1984-12-01), Kitamura et al.
patent: 4488217 (1984-12-01), Binder et al.
patent: 4531023 (1985-07-01), Levine
patent: 4584639 (1986-04-01), Hardy
patent: 4593353 (1986-06-01), Pickholtz
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4669043 (1987-05-01), Kaplinsky
patent: 4677546 (1987-06-01), Freeman et al.
patent: 4677670 (1987-06-01), Henderson, Jr.
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4742447 (1988-05-01), Duvall et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4751669 (1988-06-01), Sturgis et al.
patent: 4754326 (1988-06-01), Kram et al.
patent: 4754395 (1988-06-01), Weisshaar et al.
patent: 4771461 (1988-09-01), Matyas
patent: 4794515 (1988-12-01), Hornung
patent: 4797853 (1989-01-01), Savage et al.
patent: 4799061 (1989-01-01), Abraham et al.
patent: 4799153 (1989-01-01), Hann et al.
patent: 4829469 (1989-05-01), Germaine et al.
patent: 4858117 (1989-08-01), DiChiara et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4918653 (1990-04-01), Johri et al.
patent: 4926476 (1990-05-01), Covey
patent: 4945468 (1990-07-01), Carson et al.
patent: 4962533 (1990-10-01), Krueger et al.
patent: 5073933 (1991-12-01), Rosenthal
patent: 326669 (1989-08-01), None
National Institute of Standards and Technology, “DES Modes of Operation,” Dec. 2, 1980, FIPS PUB 81. Retrieved from the Internet:<http://www.itl.nist.gov/fipspubs/fip81.htm>.
Microsoft Press Computer Dictionary, 1997, Microsoft Corp., 3rd Ed., p. 101, 355.
Wiseman, et al.,The Trusted Path between SMITE and the User, IEEE Symposium on Security and Privacyat 147-155 (1988) (published in the U.S.A.).
Ames et al.,Security Kernel Design and Implementation: An Introduction, IEEE Computer, pp. 14-22 (Jul. 1983).
Krager et al.,A VMM Security Kernel for the VAX Architecture, (unpublished draft of Jan. 11, 1990).
Atkins, D.E.,Design of the Arithmetic Units of ILLIAC III: Use of Redundancy and Higher Radix Methods, IE Transactions on Computers, vol. C-19, No. 8, Aug. 1970, pp. 720-733.
Dunford,FILER, Version 2.20 User Documentation, (May 14, 1986).
McCauley et al.,KSOS: The Design of a Secure Operating System, Version 1.2 (1979),UNIX Operating System.
Dept. of Defense, “Dept. of Defense Trusted Computer System Evaluation Criteria,” Dec. 26, 1985. Retrieved from the Internet:<URL: http://csrc.ncsl.nist.gov/secpubs/rainbow/std001.txt>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Verification of trusted-path commands does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Verification of trusted-path commands, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Verification of trusted-path commands will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3553187

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.