US Patent No: 6,061,794

Number of patents in Portfolio can not be more than 2000

System and method for performing secure device communications in a peer-to-peer bus architecture

2 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system and method for performing secure peer-to-peer device communications on an I/O bus, such as a PCI bus, a Fiber Channel bus, an IEEE, 1394 bus or a Universal Serial Bus. The system includes a plurality of intelligent I/O devices, such as intelligent storage devices and/or controllers, communications devices, video devices and audio devices. The I/O devices perform peer-to-peer message and data transfers, thereby bypassing the operating system running on the computer's CPU. The intelligent I/O devices encrypt messages and data before transmitting them on the I/O bus and conversely decrypt the messages and data upon reception. The encryption provides secrecy and/or authentication of the sender. The devices use keys or passwords to encrypt/decrypt the data. The keys are stored in non-volatile memory in the devices and are distributed to the devices by the system BIOS at initialization time. The devices perform access authorization validation using rule sets also distributed by the BIOS at initialization time. The rule sets specify which I/O operations are valid for a peer I/O device to request of a respective I/O device based, preferably, upon the device class/subclasses of the requesting device. In another embodiment, one of the intelligent I/O devices may be a communications device which serves as a firewall for the I/O bus. In this embodiment, the rule set further includes identification information of the remote machines/devices.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPHOUSTON, TX9475

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Angelo, Michael F Houston, TX 71 2975
Driscoll, Dan J Spring, TX 1 270
Olarig, Sompong P Cypress, TX 69 3123
Wooten, David R Spring, TX 43 1021

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
* 5,745,678 Method and system for the secured distribution of multimedia titles 207 1997
 
TREND MICRO INCORPORATED (1)
* 5,787,427 Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies 190 1996
 
VERIZON PATENT AND LICENSING INC. (1)
* 4,919,545 Distributed security procedure for intelligent networks 170 1988
 
NOVELL, INC. (1)
* 5,787,175 Method and apparatus for collaborative document control 280 1995
 
IPASS INC. (1)
* 5,898,780 Method and apparatus for authorizing remote internet access 435 1996
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (1)
* 5,859,911 Method for the secure remote flashing of the BIOS of a computer 67 1997
 
HGST NETHERLANDS B.V. (1)
* 5,931,947 Secure array of remotely encrypted storage devices 200 1997
 
SCIENTIFIC RESEARCH MANAGEMENT CORPORATION (1)
* 5,826,014 Firewall system for protecting network elements connected to a public network 340 1996
 
Micron Technology, Inc. (1)
* 5,692,124 Support of limited write downs through trustworthy predictions in multilevel security of computer network communications 113 1996
 
RADIO LOCAL AREA NETWORKS, INC. (2)
* 5,530,701 Network link controller 43 1994
* 5,551,066 Network link controller for dynamic designation of master nodes 86 1995
 
Dell USA, L.P. (2)
* 5,657,445 Apparatus and method for limiting access to mass storage devices in a computer system 170 1996
* 5,805,880 Operating system independent method for avoiding operating system security for operations performed by essential utilities 40 1996
 
FUJITSU LIMITED (1)
* 5,784,464 System for and method of authenticating a client 140 1996
 
Ascend Communications, Inc. (1)
* 5,889,958 Network access control system and process 212 1996
 
Pitney Bowes Inc. (1)
* 5,390,351 System for communicating with plural nodes in predetermined intervals depended on integers assigned and changed based upon configuration thereof 27 1992
 
ROUND ROCK RESEARCH, LLC (1)
* 5,832,228 System and method for providing multi-level security in computer devices utilized with non-secure networks 170 1996
 
INTEL CORPORATION (3)
* 5,568,552 Method for providing a roving software license from one node to another node 427 1995
* 5,724,027 Method and apparatus for providing system security to personal computer systems using transparent system interrupt 35 1995
* 5,841,976 Method and apparatus for supporting multipoint communications in a protocol-independent manner 47 1996
 
CHA! TECHNOLOGIES SERVICES, INC. (1)
* 5,903,721 Method and system for secure online transaction processing 459 1997
 
UNISYS CORPORATION (1)
* 5,559,933 Distributed enterprise print controller 213 1994
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
* 5,600,803 Data transfer system and method using data bus having bi-directional serial data line, clock line and bi-directional control line 10 1994
 
AT&T CORP. (1)
* 5,706,431 System and method for distributively propagating revisions through a communications network 34 1995
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (20)
* 2006/0200,680 ATTESTATION KEY MEMORY DEVICE AND BUS 5 2001
* 2002/0032,860 Account authority digital signature 23 2001
* 2004/0064,813 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 4 2003
* 2004/0078,590 Controlling access to multiple memory zones in an isolated execution environment 1 2003
* 2004/0098,604 Access protection system for serial bus systems and method for protecting computers against an unauthorized connection of peripheral devices 4 2003
* 2005/0022,002 Protected configuration space in a protected environment 20 2004
* 2005/0182,940 System and method for execution of a secured environment initialization instruction 23 2005
* 2005/0283,660 Mechanism to handle events in a machine with isolated execution 8 2005
* 2006/0031,173 Method and apparatus for secure electronic commerce 10 2005
* 2006/0036,791 Chipset support for managing hardware interrupts in a virtual machine system 1 2005
* 2007/0136,476 Controlled peer-to-peer network 12 2005
* 2007/0186,117 Secure processor-based system and method 17 2006
* 2006/0245,590 Method of confirming a secure key exchange 6 2006
* 2009/0006,805 Method and apparatus for supporting address translation in a virtual machine environment 11 2008
* 2008/0276,235 VIRTUAL MACHINE MANAGEMENT USING PROCESSOR STATE INFORMATION 8 2008
* 2009/0224,036 System And Method Of Operation Control On An Electronic Device 7 2009
* 2010/0058,075 METHOD AND APPARATUS FOR LOADING A TRUSTABLE OPERATING SYSTEM 0 2009
8,600,830 System and method for providing a payment to a non-winning auction participant 12 2010
* 2011/0004,513 SYSTEM AND METHOD 38 2010
9,348,767 Accessing private data about the state of a data processing machine from storage that is publicly accessible 0 2012
 
ST. LUKE TECHNOLOGIES, LLC (2)
7,587,368 Information record infrastructure, system and method 99 2001
8,904,181 System and method for secure three-party communications 9 2012
 
PANASONIC CORPORATION (1)
* 2007/0015,589 COMMUNICATION CARD, CONFIDENTIAL INFORMATION PROCESSING SYSTEM, AND CONFIDENTIAL INFORMATION TRANSFER METHOD AND PROGRAM 26 2006
 
SONY CORPORATION (2)
* 7,103,660 Information processing apparatus, method thereof, network system, record medium, and program 3 2001
* 2001/0051,930 Information processing apparatus, method thereof, network system, record medium, and program 3 2001
 
Mil-Com Technologies PTE Ltd. (1)
* 6,278,913 Automated flight data management system 82 1999
 
RESEARCH IN MOTION LIMITED (2)
* 2004/0255,169 System and method of owner control of electronic devices 21 2003
* 2010/0325,741 System and Method of Owner Control of Electronic Devices 2 2010
 
GREEN PLUG, INC. (2)
* 8,296,587 Powering an electrical device through a legacy adapter capable of digital communication 11 2008
* 2009/0177,906 Powering An Electrical Device Through a Legacy Adapter Capable of Digital Communication 21 2008
 
SAMSUNG ELECTRONICS CO., LTD. (3)
* 6,639,914 Analog translator for IEEE 1394 and translating method thereof 5 1999
6,842,814 Method for managing a digital interface connection 13 2000
* 2010/0293,559 SHARING INPUT/OUTPUT (I/O) RESOURCES ACROSS MULTIPLE COMPUTING SYSTEMS AND/OR ENVIRONMENTS 0 2009
 
Digi International Inc. (3)
* 6,904,489 Methods and systems for remotely accessing universal serial bus devices 14 2001
7,185,136 Methods and systems for remotely accessing universal serial bus devices 9 2005
* 2005/0210,176 Methods and systems for remotely accessing universal serial bus devices 2 2005
 
CLOVERLEAF COMMUNICATION CO. (1)
* 2004/0143,733 Secure network data storage mediator 25 2003
 
Sony Electronics Inc. (3)
8,904,177 Authentication for a multi-tier wireless home mesh network 0 2009
* 2010/0191,968 AUTHENTICATION FOR A MULTI-TIER WIRELESS HOME MESH NETWORK 12 2009
* 8,917,671 Multi-tier wireless home mesh network with a secure network discovery protocol 1 2014
 
RIVERWOOD INTERNATIONAL CORPORATION (2)
* 7,143,284 ABDS method and verification status for authenticating entity access 13 2003
* 2003/0126,437 ABDS Method and Verification Status for Authenticating Entity Access 22 2003
 
THE WESTERN UNION COMPANY (5)
8,818,904 Generation systems and methods for transaction identifiers having biometric keys associated therewith 1 2007
7,933,835 Secure money transfer systems and methods using biometric keys associated therewith 9 2007
8,504,473 Money transfer system and messaging system 3 2007
8,762,267 Money transfer system and messaging system 0 2013
9,123,044 Generation systems and methods for transaction identifiers having biometric keys associated therewith 0 2014
 
HITACHI, LTD. (2)
* 2001/0047,460 Remote copy system of storage systems connected to fibre network 47 2001
* 2003/0237,002 Network node and communication system 53 2002
 
Sony Deutschland GmbH (1)
* 2007/0064,675 Confinement of a data transfer to within a local area network 3 2004
 
MELLANOX TECHNOLOGIES LTD. (1)
6,668,299 Software interface between a parallel bus and a packet network 28 2000
 
ORACLE AMERICA, INC. (4)
* 6,941,456 Method, system, and program for encrypting files in a computer system 59 2001
* 2002/0166,053 Method, system, and program for encrypting files in a computer system 49 2001
* 7,574,523 Relay peers for extending peer availability in a peer-to-peer networking environment 79 2002
* 2002/0143,855 Relay peers for extending peer availability in a peer-to-peer networking environment 155 2002
 
NXP B.V. (1)
* 6,212,633 Secure data communication over a memory-mapped serial communications interface utilizing a distributed firewall 169 1998
 
GOOGLE TECHNOLOGY HOLDINGS LLC (2)
* 7,899,188 Method and system to authenticate a peer in a peer-to-peer network 4 2007
* 2008/0298,579 METHOD AND SYSTEM TO AUTHENTICATE A PEER IN A PEER-TO-PEER NETWORK 5 2007
 
APPLE INC. (2)
* 8,386,606 Group formation/management system, group management device, and member device 0 2008
* 2008/0275,991 GROUP FORMATION/MANAGEMENT SYSTEM, GROUP MANAGEMENT DEVICE, AND MEMBER DEVICE 9 2008
 
FELSHER, DAVID (1)
7,181,017 System and method for secure three-party communications 454 2002
 
JANUS TECHNOLOGIES, INC. (4)
9,231,921 System and architecture for secure computer devices 0 2013
9,232,176 Method and apparatus for securing computer video and audio subsystems 0 2013
9,215,250 System and method for remotely managing security and configuration of compute devices 0 2013
9,076,003 Method and apparatus for transparently encrypting and decrypting computer interface data 0 2013
 
FUTURE LINK SYSTEMS (3)
* 6,134,662 Physical layer security manager for memory-mapped serial communications interface 51 1998
7,743,257 Security processor with bus configuration 5 2002
* 2004/0003,277 Security processor with bus configuration 3 2002
 
CANON EUROPA N.V. (1)
* 2003/0028,887 Method to control the copying and/or broadcasting of audiovisual signals transmitted to within a home audiovisual network 15 2002
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (24)
* 6,775,771 Method and system for presentation and manipulation of PKCS authenticated-data objects 13 1999
* 6,971,016 Authenticated access to storage area network 51 2000
* 6,895,453 System and method for improved handling of fiber channel remote devices 4 2001
7,072,994 Method, system, and program for determining a number of device addresses supported by a target device and configuring device addresses used by a source device to communicate with the target device 8 2002
* 2003/0177,266 Method, system, and program for configuring a source device to communicate with at least one target device 0 2002
7,356,697 System and method for authentication to an application 3 2003
* 2004/0260,925 System aand method for authentication to an application 0 2003
* 7,886,086 Method and apparatus for restricting input/output device peer-to-peer operations in a data processing system to improve reliability, availability, and serviceability 21 2005
7,552,240 Method for user space operations for direct I/O between an application instance and an I/O adapter 0 2005
7,502,872 Method for out of user space block mode I/O directly between an application instance and an I/O adapter 15 2005
7,502,871 Method for query/modification of linear block address table entries for direct I/O 0 2005
7,464,189 System and method for creation/deletion of linear block address table entries for direct I/O 1 2005
* 2007/0005,815 System and method for processing block mode I/O operations using a linear block address translation protection table 5 2005
* 2006/0265,525 System and method for processor queue to linear block address translation using protection table control based on a protection domain 8 2005
* 2006/0265,561 System and method for out of user space block mode I/O directly between an application instance and an I/O adapter 8 2005
* 2006/0265,522 System and method for query/modification of linear block address table entries for direct I/O 5 2005
* 2006/0265,521 System and method for creation/deletion of linear block address table entries for direct I/O 0 2005
7,657,662 Processing user space operations directly between an application instance and an I/O adapter 0 2005
7,577,761 Out of user space I/O directly between a host system and a physical adapter using file based linear block address translation 0 2005
* 2007/0168,567 System and method for file based I/O directly between an application instance and an I/O adapter 17 2005
* 2007/0078,892 System and method for processing user space operations directly between an application instance and an I/O adapter 4 2005
* 2007/0061,493 System and method for out of user space I/O directly between a host system and a physical adapter using file based linear block address translation 2 2005
7,877,792 System and method for authentication to an application 2 2008
7,849,228 Mechanisms for creation/deletion of linear block address table entries for direct I/O 2 2008
 
LENOVO PC INTERNATIONAL (1)
6,996,705 Method and system for configuring the language of the BIOS in a computer system 4 2001
 
Green Packet, Inc. (1)
7,854,011 Method of managing digital rights 3 2005
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
7,240,201 Method and apparatus to provide secure communication between systems 6 2003
* 2004/0104,466 Integrated circuit device/circuit board connection apparatus 2 2003
 
SIEMENS AKTIENGESELLSCHAFT (2)
8,171,073 Computer system connected to a data communications network 0 2003
* 2004/0059,948 Computer system connected to a data communications network 1 2003
 
CISCO TECHNOLOGY, INC. (6)
* 7,117,527 Device, system, and method for capturing email borne viruses 2 2000
* 7,965,843 Methods and apparatus for security over fibre channel 16 2001
* 7,333,612 Methods and apparatus for confidentiality protection for Fibre Channel Common Transport 5 2004
* 2005/0207,579 Methods and apparatus for confidentially protection for Fibre Channel Common Transport 3 2004
8,914,858 Methods and apparatus for security over fibre channel 0 2011
* 2011/0219,438 METHODS AND APPARATUS FOR SECURITY OVER FIBRE CHANNEL 1 2011
 
BLACKBERRY LIMITED (28)
7,793,355 System and method of owner control of electronic devices 19 2003
* 2004/0177,270 System and method of multiple-level control of electronic devices 39 2004
8,045,958 System and method for application program operation on a wireless device 18 2005
* 2007/0118,558 System and method for application program operation on a wireless device 38 2005
8,332,906 Method of customizing a standardized IT policy 3 2006
* 2007/0204,324 Method of customizing a standardized it policy 20 2006
8,543,697 System and method for communicating state management between a browser user-agent and a server 0 2006
* 8,195,763 Secure method of synchronizing cache contents of a mobile browser with a server 6 2006
8,005,891 Method for training a server for content delivery based on communication of state information from a mobile device browser 91 2006
* 2007/0198,716 Method of controlling delivery of multi-part content from an origin server to a mobile device browser via a server 30 2006
* 2007/0198,634 Method for training a server for content delivery based on communication of state information from a mobile device browser 30 2006
* 2007/0180,125 Secure method of synchronizing cache contents of a mobile browser with a server 41 2006
* 2007/0179,985 Method for detecting state changes between data stored in a first computing device and data retrieved from a second computing device 9 2006
8,544,057 Method of customizing a standardized IT policy 2 2007
* 2007/0204,326 METHOD OF CUSTOMIZING A STANDARDIZED IT POLICY 10 2007
* 2010/0269,154 METHOD OF COMMUNCIATING STATE INFORMATION BETWEEN A SERVER AND A MOBILE DEVICE BROWSER WITH VERSION HANDLING 1 2010
8,429,410 System and method of installing software applications on electronic devices 1 2010
* 2010/0275,029 SYSTEM AND METHOD OF INSTALLING SOFTWARE APPLICATIONS ON ELECTRONIC DEVICES 4 2010
8,302,185 System and method of owner control of electronic devices 1 2010
8,887,988 System and method of owner application control of electronic devices 0 2010
* 2011/0010,705 System and Method of Owner Application Control of Electronic Devices 12 2010
8,254,884 System and method for application program operation on a wireless device 5 2011
* 8,930,494 Secure method of synchronizing cache contents of a mobile browser with a server 0 2012
* 2012/0210,131 SECURE METHOD OF SYNCHRONIZING CACHE CONTENTS OF A MOBILE BROWSER WITH A SERVER 2 2012
8,699,999 System and method for application program operation on a wireless device 0 2012
8,689,284 Method of customizing a standardized IT policy 0 2012
9,033,216 System and method of owner application control of electronic devices 0 2012
8,893,957 System and method of owner application control of electronic devices 0 2012
 
SKYPE LIMITED (6)
8,009,572 Peer-to-peer telephone system 2 2004
* 2005/0122,965 Peer-to-peer telephone system 22 2004
* 8,473,545 Distributing presence information 1 2009
* 2010/0064,014 Distributing presence information 3 2009
8,593,978 Peer-to-peer telephone system 0 2010
* 2010/0177,770 Peer-To-Peer Telephone System 2 2010
 
FIRST DATA CORPORATION (67)
6,820,202 Account authority digital signature (AADS) system 92 1998
8,620,814 Three party account authority digital signature (AADS) system 0 2001
* 2002/0112,160 Three Party Account Authority Digital Signature (AADS) System 25 2001
7,558,965 Entity authentication in electronic communications by providing verification status of device 41 2001
7,552,333 Trusted authentication digital signature (tads) system 26 2001
7,500,272 Manufacturing unique devices that generate digital signatures 14 2001
7,200,749 Method and system for using electronic communications for an electronic contract 27 2001
* 7,047,416 Account-based digital signature (ABDS) system 22 2001
* 6,983,368 Linking public key of device to information during manufacture 10 2001
* 6,978,369 Person-centric account-based digital signature system 101 2001
* 2002/0026,575 Account-based digital signature (ABDS) system 67 2001
6,820,199 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system 24 2002
* 2003/0177,361 Method and system for using electronic communications for an electronic contract 17 2002
* 7,010,691 ABDS system utilizing security information in authenticating entity access 21 2003
* 6,950,940 ABDS method utilizing security information in authenticating entity access 40 2003
* 6,938,156 ABDS system and verification status for authenticating entity access 86 2003
* 6,851,054 Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource 67 2003
* 2003/0131,235 ABDS Method Utilizing Security Information in Authenticating Entity Access 4 2003
* 2003/0131,234 Account-Based Digital Signature (ABDS) System for Authenticating Entity Access to Controlled Resource 0 2003
* 2003/0126,439 ABDS System Utilizing Security Information in Authenticating Entity Access 1 2003
* 7,096,354 Central key authority database in an ABDS system 64 2003
* 7,082,533 Gauging risk in electronic communications regarding accounts in ABDS system 9 2003
* 7,047,414 Managing database for reliably identifying information of device generating digital signatures 39 2003
* 7,028,185 Managing database for identifying to recipients security features of devices generating digital signatures 23 2003
* 6,959,381 Central key authority (CKA) database for user accounts in ABDS system 25 2003
* 6,957,336 Establishing initial PuK-linked account database 13 2003
* 6,952,773 Requesting execution of instructions on accounts in ABDS system 11 2003
* 6,915,430 Reliably identifying information of device generating digital signatures 16 2003
* 6,892,302 Incorporating security certificate during manufacture of device generating digital signatures 17 2003
* 6,789,189 Managing account database in ABDS system 37 2003
* 2003/0115,463 Requesting Execution of Instructions on Accounts in ABDS System 3 2003
* 2003/0101,344 Establishing Initial PuK-Linked Account Database 15 2003
* 2003/0097,562 Managing Database for Reliably Identifying Information of Device Generating Digital Signatures 2 2003
* 2003/0097,561 Gauging Risk in Electronic Communications Regarding Accounts in ABDS System 0 2003
* 2003/0097,569 Reliably Identifying Information of Device Generating Digital Signatures 19 2003
* 2003/0097,565 Central Key Authority (CKA) Database for User Accounts in ABDS System 1 2003
* 2003/0097,573 Central Key Authority Database in an ABDS System 6 2003
* 2004/0128,508 Method and apparatus for access authentication entity 32 2003
* 2004/0030,901 Linking public key of device to information during manufacture 8 2003
* 2003/0115,151 Person-centric account-based digital signature system 14 2003
7,257,228 Account authority digital signature (AADS) system using encoded information 11 2004
* 2005/0044,373 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM USING ENCODED INFORMATION 1 2004
* 7,032,112 Account authority digital signature (AADS) system using transactional account information 8 2004
* 2005/0005,117 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM USING TRANSACTIONAL ACCOUNT INFORMATION 0 2004
* 7,089,421 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system 8 2004
* 2005/0005,118 SENDING ELECTRONIC TRANSACTION MESSAGE, DIGITAL SIGNATURE DERIVED THEREFROM, AND SENDER IDENTITY INFORMATION IN AADS SYSTEM 2 2004
7,549,050 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system 1 2004
7,519,821 Account authority digital signature (AADS) system 1 2004
* 2005/0005,123 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM 10 2004
7,831,519 Methods and systems for electromagnetic initiation of secure transactions 4 2004
* 2005/0137,986 Methods and systems for electromagnetic initiation of secure transactions 27 2004
7,936,869 Verifying digital signature based on shared knowledge 1 2005
7,869,593 Software for providing based on shared knowledge public keys having same private key 3 2005
7,693,277 Generating digital signatures using ephemeral cryptographic key 0 2005
7,593,527 Providing digital signature and public key based on shared knowledge 7 2005
7,490,239 Facilitating digital signature based on ephemeral private key 4 2005
* 2006/0156,013 DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEM 2 2005
* 2006/0156,012 FACILITATING DIGITAL SIGNATURE BASED ON EPHEMERAL PRIVATE KEY 1 2005
* 2006/0153,370 GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATA 10 2005
* 2006/0153,366 VERIFYING DIGITAL SIGNATURE BASED ON SHARED KNOWLEDGE 3 2005
* 2006/0153,371 GENERATING DIGITAL SIGNATURES USING EPHEMERAL CRYPTOGRAPHIC KEY 3 2005
* 2006/0153,365 PROVIDING DIGITAL SIGNATURE AND PUBLIC KEY BASED ON SHARED KNOWLEDGE 2 2005
* 2006/0153,368 SOFTWARE FOR PROVIDING BASED ON SHARED KNOWLEDGE PUBLIC KEYS HAVING SAME PRIVATE KEY 19 2005
* 2006/0153,364 ASYMMETRIC KEY CRYPTOSYSTEM BASED ON SHARED KNOWLEDGE 10 2005
* 2006/0153,367 DIGITAL SIGNATURE SYSTEM BASED ON SHARED KNOWLEDGE 2 2005
* 2007/0078,781 Information access control 2 2006
7,784,106 Manufacturing unique devices that generate digital signatures 3 2009
 
EMC CORPORATION (6)
7,756,986 Method and apparatus for providing data management for a storage system coupled to a network 2 1998
* 2003/0115,324 METHOD AND APPARATUS FOR PROVIDING DATA MANAGEMENT FOR A STORAGE SYSTEM COUPLED TO A NETWORK 29 1998
* 6,263,445 Method and apparatus for authenticating connections to a storage system coupled to a network 133 1998
7,260,636 Method and apparatus for preventing unauthorized access by a network device 18 2000
* 7,624,265 Methods and apparatus for establishing communications with a data storage system 5 2001
* 2007/0226,338 Registration of peer-to-peer services 3 2006
 
INTEL CORPORATION (129)
* 6,510,521 Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage 46 1998
* 6,401,208 Method for BIOS authentication prior to BIOS execution 98 1998
* 6,965,911 Efficiently exporting local device access onto a system area network using a direct-call interface 9 1998
6,560,706 Interface for ensuring system boot image integrity and authenticity 108 1999
7,356,817 Real-time scheduling of virtual machines 17 2000
7,111,176 Generating isolated bus cycles for isolated execution 8 2000
7,089,418 Managing accesses in a processor for isolated execution 7 2000
7,073,071 Platform and method for generating and utilizing a protected audit log 8 2000
7,013,481 Attestation key memory device and bus 24 2000
7,013,484 Managing a secure environment using a chipset in isolated execution mode 26 2000
6,996,710 Platform and method for issuing and certifying a hardware-protected attestation key 29 2000
6,990,579 Platform and method for remote attestation of a platform 23 2000
6,957,332 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 11 2000
6,760,441 Generating a key hieararchy for use in an isolated execution environment 40 2000
6,754,815 Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set 27 2000
7,085,935 Managing a secure environment using a chipset in isolated execution mode 6 2000
7,082,615 Protecting software environment in isolated execution 33 2000
6,941,458 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 11 2000
7,793,111 Mechanism to handle events in a machine with isolated execution 0 2000
7,389,427 Mechanism to secure computer output from software attack using isolated execution 15 2000
7,215,781 Creation and distribution of a secret value between two devices 1 2000
7,818,808 Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor 25 2000
7,225,441 Mechanism for providing power management through virtualization 51 2000
* 7,117,376 Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations 24 2000
7,035,963 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 25 2000
6,907,600 Virtual translation lookaside buffer 80 2000
* 2003/0120,856 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 5 2000
* 2002/0087,877 Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations 16 2000
6,769,058 Resetting a processor in an isolated execution environment 7 2000
7,194,634 Attestation key memory device and bus 14 2001
7,272,831 Method and apparatus for constructing host processor soft devices independent of the host processor operating system 32 2001
7,096,497 File checking using remote signing authority via a network 13 2001
7,191,440 Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor 64 2001
7,024,555 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 25 2001
7,103,771 Connecting a virtual token to a physical token 37 2001
7,308,576 Authenticated code module 3 2001
7,480,806 Multi-token seal and unseal 8 2002
7,631,196 Method and apparatus for loading a trustable operating system 4 2002
* 7,130,999 Using authentication certificates for authorization 20 2002
* 2003/0188,156 Using authentication certificates for authorization 23 2002
7,069,442 System and method for execution of a secured environment initialization instruction 29 2002
7,028,149 System and method for resetting a platform configuration register 46 2002
7,076,669 Method and apparatus for communicating securely with a token 2 2002
7,058,807 Validation of inclusion of a platform within a data center 24 2002
7,127,548 Control register access virtualization performance improvement in the virtual-machine architecture 11 2002
7,139,890 Methods and arrangements to interface memory 21 2002
6,820,177 Protected configuration space in a protected environment 9 2002
7,142,674 Method of confirming a secure key exchange 11 2002
* 2003/0233,550 Method of confirming a secure key exchange 2 2002
7,392,415 Sleep protection 2 2002
7,124,327 Control over faults occurring during the operation of guest software in the virtual-machine architecture 19 2002
6,996,748 Handling faults associated with operation of guest software in the virtual-machine architecture 16 2002
7,296,267 System and method for binding virtual machines to hardware contexts 48 2002
* 7,526,595 Data path master/slave data processing device apparatus and method 2 2002
* 7,512,975 Hardware-assisted credential validation 15 2002
* 2004/0034,790 Hardware-assisted credential validation 1 2002
7,546,452 Hardware-based credential management 3 2002
* 2004/0039,937 Hardware-based credential management 12 2002
* 2004/0064,457 Mechanism for providing both a secure and attested boot 46 2002
7,165,181 System and method for establishing trust without revealing identity 28 2002
7,073,042 Reclaiming existing fields in address translation data structures to extend control over memory accesses 16 2002
7,318,235 Attestation using both fixed token and portable token 18 2002
7,900,017 Mechanism for remapping post virtual machine memory pages 2 2002
* 2004/0128,345 Dynamic service registry 55 2002
* 2004/0128,465 Configurable memory bus width 5 2002
7,076,802 Trusted system clock 10 2002
* 2004/0128,549 Trusted system clock 16 2002
* 2004/0193,860 Methods and apparatus to export information from hardware devices 3 2003
7,415,708 Virtual machine management using processor state information 21 2003
* 2004/0268,347 Virtual machine management using processor state information 76 2003
7,424,709 Use of multiple virtual machine monitors to handle privileged events 18 2003
7,287,197 Vectoring an interrupt or exception upon resuming operation of a virtual machine 5 2003
* 2005/0060,703 Vectoring an interrupt or exception upon resuming operation of a virtual machine 0 2003
7,739,521 Method of obscuring cryptographic computations 0 2003
* 2005/0084,098 Method of obscuring cryptographic computations 7 2003
7,237,051 Mechanism to control hardware interrupt acknowledgement in a virtual machine system 14 2003
7,177,967 Chipset support for managing hardware interrupts in a virtual machine system 17 2003
7,020,738 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 9 2003
* 2005/0080,970 Chipset support for managing hardware interrupts in a virtual machine system 1 2003
* 2005/0080,934 Invalidating translation lookaside buffer entries in a virtual machine (VM) system 15 2003
6,934,817 Controlling access to multiple memory zones in an isolated execution environment 20 2003
7,636,844 Method and system to provide a trusted channel within a computer system for a SIM device 6 2003
* 2005/0108,171 Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform 18 2003
8,156,343 Accessing private data about the state of a data processing machine from storage that is publicly accessible 2 2003
8,037,314 Replacing blinded authentication authority 3 2003
7,802,085 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 6 2004
* 2005/0216,920 Use of a virtual machine to emulate a hardware device 23 2004
7,356,735 Providing support for single stepping a virtual machine in a virtual machine environment 6 2004
* 2005/0240,819 Providing support for single stepping a virtual machine in a virtual machine environment 5 2004
7,620,949 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
* 2005/0240,700 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
7,490,070 Apparatus and method for proving the denial of a direct proof signature 10 2004
7,366,849 Protected configuration space in a protected environment 5 2004
* 2005/0288,056 System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module 7 2004
7,305,592 Support for nested fault in a virtual machine environment 17 2004
* 2006/0005,084 Support for nested faults in a virtual machine environment 1 2004
7,840,962 System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time 3 2004
* 2006/0075,402 Providing support for a timer associated with a virtual machine monitor 19 2004
8,146,078 Timer offsetting mechanism in a virtual machine environment 8 2004
8,924,728 Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information 0 2004
8,533,777 Mechanism to determine trust of out-of-band management agents 0 2004
7,395,405 Method and apparatus for supporting address translation in a virtual machine environment 13 2005
7,313,669 Virtual translation lookaside buffer 6 2005
7,546,457 System and method for execution of a secured environment initialization instruction 12 2005
* 2005/0188,198 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 6 2005
7,809,957 Trusted platform module for generating sealed data 7 2005
7,302,511 Chipset support for managing hardware interrupts in a virtual machine system 10 2005
7,516,330 Platform and method for establishing provable identities while maintaining privacy 2 2005
7,921,293 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 0 2006
8,014,530 Method and apparatus for authenticated, recoverable key distribution with no database secrets 2 2006
7,454,611 System and method for establishing trust without revealing identity 3 2007
* 2007/0113,077 System and Method for Establishing Trust Without Revealing Identity 0 2007
7,836,275 Method and apparatus for supporting address translation in a virtual machine environment 3 2008
8,296,762 Virtual machine management using processor state information 2 2008
7,707,347 Data path master/slave data processing device apparatus 0 2009
8,185,734 System and method for execution of a secured environment initialization instruction 2 2009
7,861,245 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 0 2009
8,407,476 Method and apparatus for loading a trustable operating system 0 2009
8,386,788 Method and apparatus for loading a trustable operating system 0 2009
* 2010/0169,527 DATA PATH MASTER/SLAVE DATA PROCESSING DEVICE 0 2010
8,639,915 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 0 2010
8,671,275 Mechanism to handle events in a machine with isolated execution 0 2010
8,522,044 Mechanism to handle events in a machine with isolated execution 0 2010
8,543,772 Invalidating translation lookaside buffer entries in a virtual machine (VM) system 2 2010
8,195,914 Mechanism for remapping post virtual machine memory pages 0 2011
9,009,483 Replacing blinded authentication authority 0 2011
8,645,688 System and method for execution of a secured environment initialization instruction 0 2012
9,087,000 Accessing private data about the state of a data processing machine from storage that is publicly accessible 1 2013
8,751,752 Invalidating translation lookaside buffer entries in a virtual machine system 0 2013
 
TEXAS INSTRUMENTS INCORPORATED (1)
* 2004/0117,642 Secure media card operation over an unsecured PCI bus 8 2002
 
QINETIQ LIMITED (2)
* 9,325,669 Network security content checking 0 2011
* 2013/0073,843 Network Security Content Checking 0 2011
 
UGUARD CORPORATION (1)
* 2002/0178,370 Method and apparatus for secure authentication and sensitive data management 71 2000
 
Galea Secured Networks Inc. (1)
* 2002/0116,644 Adapter card for wirespeed security treatment of communications traffic 12 2002
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (6)
* 6,839,771 Method and system for using a universal serial bus (USB) as a peer-to-peer network 43 2000
6,717,821 Integrated circuit device/circuit board connection apparatus 6 2002
7,228,432 Method and apparatus for providing security for a computer system 10 2003
* 2005/0060,541 Method and apparatus for providing security for a computer system 5 2003
7,930,503 Method and apparatus for operating multiple security modules 0 2004
7,382,880 Method and apparatus for initializing multiple security modules 5 2004
 
VISIONSHARE, INC. (3)
* 2003/0131,232 Directory-based secure communities 31 2002
* 2003/0130,960 Bridging service for security validation within enterprises 19 2002
* 2004/0003,247 Non-centralized secure communication services 56 2003
 
HGST NETHERLANDS B.V. (2)
* 8,363,837 Data storage device with data transformation capability 1 2005
* 2006/0193,470 Data storage device with data transformation capability 10 2005
 
Micron Technology, Inc. (4)
* 6,298,409 System for data and interrupt posting for computer devices 4 1998
7,610,611 Prioritized address decoder 2 2003
* 2005/0086,508 Prioritized address decoder 1 2003
* 2005/0071,656 Secure processor-based system and method 12 2003
 
Western Digital Ventures, Inc. (3)
7,215,771 Secure disk drive comprising a secure drive key and a drive ID for implementing secure communication over a public network 158 2000
7,155,616 Computer network comprising network authentication facilities implemented in a disk drive 104 2000
7,003,674 Disk drive employing a disk with a pristine area for storing encrypted data accessible only by trusted devices or clients to facilitate secure network communications 131 2000
 
IGT (4)
* 7,819,750 USB software architecture in a gaming machine 27 2003
7,704,147 Download procedures for peripheral devices 54 2003
* 2004/0254,006 USB software architecture in a gaming machine 92 2003
* 2004/0254,013 Download procedures for peripheral devices 130 2003
 
LENOVO INTERNATIONAL LIMITED (2)
7,500,071 Method for out of user space I/O with server authentication 2 2005
* 2007/0050,591 System and method for out of user space I/O with server authentication 40 2005
 
NOKIA TECHNOLOGIES OY (2)
7,206,935 System and method for protecting network appliances against security breaches 2 2002
* 2002/0188,724 System and method for protecting network appliances against security breaches 2 2002
 
RARITAN COMPUTER, INC. (1)
* 2006/0059,250 Remote management of computers 0 2002
 
PAYPAL, INC. (1)
6,914,985 Method and system for presentation and manipulation of PKCS enveloped-data objects 17 1999
 
MICROSOFT TECHNOLOGY LICENSING, LLC (36)
* 6,751,728 System and method of transmitting encrypted packets through a network access point 54 1999
7,469,343 Dynamic substitution of USB data for on-the-fly encryption/decryption 10 2003
* 2004/0250,087 Dynamic substitution of USB data for on-the-fly encryption/decryption 7 2003
7,702,668 Asset composition 1 2003
* 2004/0254,951 Asset composition 2 2003
* 2005/0228,984 Web service gateway filtering 52 2004
* 2006/0106,920 Method and apparatus for dynamically activating/deactivating an operating system 21 2004
8,347,078 Device certificate individualization 0 2004
8,464,348 Isolated computing environment anchored into CPU and motherboard 0 2004
8,365,301 Peer-to-peer network communication 3 2005
* 7,849,303 Peer-to-peer network information storage 5 2005
* 2006/0190,716 Peer-to-peer network information storage 11 2005
* 2006/0191,020 Peer-to-peer network communication 23 2005
* 7,669,056 Method and apparatus for measuring presentation data exposure 16 2005
8,725,646 Output protection levels 0 2005
7,817,647 Flower-petal resolutions for PNRP 2 2005
* 2006/0239,197 Flower-petal resolutions for PNRP 1 2005
8,438,645 Secure clock with grace periods 1 2005
8,353,046 System and method for delivery of a modular operating system 1 2005
8,176,564 Special PC mode entered upon detection of undesired state 4 2005
* 2006/0107,329 Special PC mode entered upon detection of undesired state 11 2005
8,336,085 Tuning product policy using observed evidence of customer behavior 2 2005
* 2007/0033,102 Securely providing advertising subsidized computer usage 29 2005
* 7,870,096 Asset composition 0 2006
* 2006/0117,044 Asset composition 0 2006
7,720,962 Peer-to-peer name resolution protocol (PNRP) security infrastructure and method 8 2006
8,255,988 Direct peripheral communication for restricted mode operation 6 2007
* 2008/0238,612 Direct Peripheral Communication for Restricted Mode Operation 5 2007
8,700,535 Issuing a publisher use license off-line in a digital rights management (DRM) system 0 2008
7,725,567 Peer-to-peer name resolution protocol (PNRP) security infrastructure and method 0 2008
* 2009/0006,849 PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD 2 2008
9,189,605 Protected computing environment 0 2009
8,719,171 Issuing a publisher use license off-line in a digital rights management (DRM) system 0 2010
8,781,969 Extensible media rights 1 2010
9,336,359 Device certificate individualization 0 2012
9,224,168 Tuning product policy using observed evidence of customer behavior 0 2012
 
UBS AG, STAMFORD BRANCH (1)
* 2002/0188,752 Control messaging for an entertainment and communications network 6 2001
 
PIONEER CORPORATION (2)
* 7,222,364 Information sending method and information sending apparatus, information receiving apparatus and information receiving method, information transmission system and information transmission method, and information recording medium 0 2001
* 2002/0027,991 Information sending method and information sending apparatus, information receiving apparatus and information receiving method, information transmission system and information transmission method, and information recording medium 2 2001
 
TELEFONAKTIEBOLAGET L M ERICSSON (PUBL) (2)
* 8,046,514 Broadcasting data across a bus in which data transmission can be delayed if a snooping device is not ready to receive 0 2001
* 2004/0220,948 Broadcasting data across a bus 2 2003
 
UNIVERSAL DATA PROTECTION CORPORATION (1)
* 2008/0189,381 METHOD AND SYSTEM FOR SECURE COMMUNICATION BETWEEN DEVICES 0 2008
 
BEIJING XIAOMI MOBILE SOFTWARE CO., LTD. (1)
7,366,305 Platform and method for establishing trust without revealing identity 4 2003
 
TOSHIBA GLOBAL COMMERCE SOLUTIONS HOLDINGS CORPORATION (2)
6,993,650 Authentications integrated into a boot code image 12 2001
9,117,082 Authentications integrated into a boot code image 0 2005
 
DELL PRODUCTS L.P. (4)
* 8,528,046 Selective management controller authenticated access control to host mapped resources 0 2010
* 9,043,872 Selective management controller authenticated access control to host mapped resources 0 2013
* 2013/0318,338 Selective Management Controller Authenticated Access Control to Host Mapped Resources 0 2013
* 2014/0047,243 System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System 1 2013
 
ALIO, INC. (4)
* 2005/0177,745 Distributed System and Methodology for Delivery of Media Content 16 2004
* 2005/0177,624 Distributed System and Methodology for Delivery of Media Content to Clients having Peer-to-peer Connectivity 42 2004
* 2005/0177,853 System and Methodology for Distributed Delivery of Online Content in Response to Client Selections from an Online Catalog 83 2004
* 2011/0231,867 SYSTEM AND METHODOLOGY FOR DISTRIBUTED DELIVERY OF ONLINE CONTENT IN RESPONSE TO CLIENT SELECTIONS FROM AN ONLINE CATALOG 6 2010
 
COLLIGO NETWORKS, INC. (6)
* 2003/0135,552 Method for discovering and discriminating devices on local collaborative networks to facilitate collaboration among users 8 2002
7,613,772 Method for context based discovery and filtering of portable collaborative networks 9 2002
* 2004/0019,641 Method for context based discovery and filtering of portable collaborative networks 10 2002
8,909,710 Method for discovering and discriminating devices on local collaborative networks to facilitate collaboration among users 1 2008
* 2009/0222,537 System And Method For Interactive Instant Networking 20 2008
8,725,865 Method for context based discovery and filtering of portable collaborative networks 0 2009
 
EBAY INC. (1)
6,772,341 Method and system for presentation and manipulation of PKCS signed-data objects 17 1999
 
Architecture Technology Corporation (1)
* 8,015,211 Secure peer-to-peer object storage system 9 2004
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (2)
7,380,118 Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method 3 2003
* 2003/0226,011 Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method 15 2003
* Cited By Examiner