Providing a secure hardware identifier (HWID) for use in...

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000

Reexamination Certificate

active

07152243

ABSTRACT:
A trusted component on a device includes a secure HWID therein and is verified by obtaining a key from the device, and verifying each signed component of the operating system of the device therewith. A driver table is examined to locate a HWID driver which is verified as containing a pointer back to an address inside a kernel. The verified operating system is called to obtain the secure HWID from a HWID component by way of the HWID driver and to return same to the trusted component. Thereafter, the returned HWID is verified as matching the HWID included with the trusted component.

REFERENCES:
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5715403 (1998-02-01), Stefik
patent: 5964873 (1999-10-01), Choi
patent: 6149522 (2000-11-01), Alcorn et al.
patent: 6327652 (2001-12-01), England et al.
patent: 6418472 (2002-07-01), Mi et al.
patent: 2001/0037323 (2001-11-01), Moulton et al.
patent: 2002/0174356 (2002-11-01), Padole et al.
patent: 2003/0097581 (2003-05-01), Zimmer
patent: WO 98/42098 (1998-09-01), None
patent: WO 00/21239 (2000-04-01), None
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
“Digital Rights Management for Audio Drivers”,White Paper from Microsoft, Dec. 04, 2001, 1-3, XP-002303668, http://microsoft.com/whdc/archive.
Hollingworth, D. et al., “Security Policy Realization in an Extensible Operating System”,Information Survivability Conference and Exposition, 2000, 330-334, XP 0110371152.
Beese, L.J. “Security Strategy for Networked Computers”,Proceedings of the 1987 Carnahan Conference on Security Technology:Electronic Crime Countermeasures, 1987, 141-147.
Devanbu, P. et al., “Research Directions for Automated Software Verification; Using Trusted Hardware”,Proceedings. 12thIEEE International Conference Automated Software Engineering(Cat. No.97TB100200), 1997, 274-279.
Griswold, G.N., “A Method for Protecting Copyright on Networks”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 169-178.
Kahn, R.E., “Deposit, Registration, and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 111-120.
Lindqvist, U. et al., “An Analysis of a Secure System Based on Trusted Components”,COMPASS '96. Proceedings of the Eleventh Annual Conference on Computer Assurance. Systems Integrity. Software Safety. Process Security(Cat. No. 96CH35960), 1996, 213-223.
Smith, S.W. et al., “Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors”,Proceedings of the 3rdUSENIX Workshop on Electronic Commerce, 1998, 83-98.
Weinberg, J. “Hardware-based ID, rights management, and trusted systems”,Journal, 2000, 52(5), 1251-1281.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Providing a secure hardware identifier (HWID) for use in... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Providing a secure hardware identifier (HWID) for use in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Providing a secure hardware identifier (HWID) for use in... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3718502

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.