Systems and methods using cryptography to protect secure computing environments

Number of patents in Portfolio can not be more than 2000

United States of America Patent

PATENT NO 7925898
APP PUB NO 20060248353A1
SERIAL NO

11454072

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddress
INTERTRUST TECHNOLOGIES CORPCALIFORNIA USA

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Shear, Victor H Bethesda, US 147 30079
Sibert, W Olin Lexington, US 103 10596
Van, Wie David M Sunnyvale, US 146 28506

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation