US Patent No: 7,308,576

Number of patents in Portfolio can not be more than 2000

Authenticated code module

ALSO PUBLISHED AS: 20030126442

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

An authenticated code module comprises a value that attests to the authenticity of the module. The value is encrypted with a key corresponding to a key of a computing device that is to execute the module.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTEL CORPORATIONSANTA CLARA, CA23978

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Glew, Andrew F Madison, WA 124 3069
Grawrock, David W Aloha, OR 97 814
Kozuch, Michael A Export, PA 35 422
Neiger, Gilbert Portland, OR 217 2075
Smith, Lawrence O Beaverton, OR 39 284
Sutton, James A Portland, OR 75 1057

Cited Art Landscape

Patent Info (Count) # Cites Year
 
N.star-solid.Able Technologies, Inc. (1)
6,138,239 Method and system for authenticating and utilizing secure resources in a computer system 89 1998
 
Other [Check patent profile for assignment information] (3)
5,720,609 Catalytic method 78 1996
6,473,508 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys 28 1998
2001/0037,450 System and method for process protection 173 2001
 
TREND MICRO INCORPORATED (1)
5,680,547 Method and apparatus for controlling network and workstation access prior to workstation boot 160 1995
 
KELLY SERVICES, INC. (1)
5,007,082 Computer software encryption apparatus 168 1990
 
LEVADA, VICTOR (1)
6,085,296 Sharing memory pages and page tables among computer processes 161 1997
 
BROWN, DOUGLAS G. (1)
5,944,821 Secure software registration and integrity assessment in a computer system 254 1996
 
SAMSUNG ELECTRONICS CO., LTD. (1)
5,717,903 Method and appartus for emulating a peripheral device to allow device driver development before availability of the peripheral device 122 1995
 
HITACHI, LTD. (9)
4,975,836 Virtual computer system 114 1985
4,802,084 Address translator 105 1986
5,187,802 Virtual machine system with vitual machine resetting store indicating that virtual machine processed interrupt without virtual machine control program intervention 100 1989
5,295,251 Method of accessing multiple virtual address spaces and computer system 95 1990
5,437,033 System for recovery from a virtual machine monitor failure with a continuous guest dispatched to a nonguest mode 148 1991
5,511,217 Computer system of virtual machines sharing a vector processor 123 1993
5,506,975 Virtual machine I/O interrupt control method compares number of pending I/O interrupt conditions for non-running virtual machines with predetermined number 125 1993
5,628,022 Microcomputer with programmable ROM 99 1994
5,504,922 Virtual machine with hardware display controllers for base and target machines 108 1994
 
AKAMAI TECHNOLOGIES, INC. (4)
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 30 2009
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 30 2009
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 30 2009
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 30 2009
 
DEUTSCHE TELEKOM AG (1)
6,222,923 Method for securing system protected by a key hierarchy 115 1997
 
MCGOUGH, PAUL (1)
6,445,797 Method and system for performing secure electronic digital streaming 133 1998
 
HITACHI MICROCOMPUTER ENGINEERING LTD. (1)
4,571,672 Access control method for multiprocessor systems 141 1983
 
SANDIA CORPORATION (1)
5,832,089 Off-line compatible electronic cash method and system 100 1995
 
RENESAS ELECTRONICS CORPORATION (1)
5,872,994 Flash memory incorporating microcomputer having on-board writing function 186 1996
 
BT COUNTERPANE INTERNET SECURITY, INC. (1)
5,978,475 Event auditing system 203 1997
 
HELBIG, WALTER A., SR. (1)
5,953,502 Method and apparatus for enhancing computer system security 200 1997
 
KABUSHIKI KAISHA TOSHIBA (1)
5,890,189 Memory management and protection system for virtual memory in computer system 148 1996
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (12)
4,366,537 Authorization mechanism for transfer of program control or data between different address spaces having different storage protect keys 132 1980
4,843,541 Logical resource partitioning of a data processing system 305 1987
5,230,069 Apparatus and method for providing private and shared access to host address and data spaces by guest programs in a virtual machine computer system 126 1990
5,317,705 Apparatus and method for TLB purge reduction in a multi-level machine system 146 1993
5,555,385 Allocation of address spaces within virtual machine compute system 159 1993
5,564,040 Method and apparatus for providing a server function in a logically partitioned hardware machine 191 1994
5,555,414 Multiprocessing system including gating of host I/O and external enablement to guest enablement at polling intervals 131 1994
5,628,023 Virtual storage computer system having methods and apparatus for providing token-controlled access to protected pages of memory via a token-accessible view 57 1994
5,764,969 Method and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization 99 1995
5,854,913 Microprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architectures 160 1997
6,175,924 Method and apparatus for protecting application data in secure storage areas 142 1997
5,956,408 Apparatus and method for secure distribution of data 165 1998
 
ADVANCED MICRO DEVICES, INC. (2)
6,421,702 Interrupt driven isochronous task scheduler system 99 1998
6,499,123 Method and apparatus for debugging an integrated circuit 151 2000
 
NIKON CORPORATION (1)
6,252,650 Exposure apparatus, output control method for energy source, laser device using the control method, and method of producing microdevice 101 2000
 
TENNECO AUTOMOTIVE OPERATING COMPANY INC. (1)
6,158,546 Straight through muffler with conically-ended output passage 117 1999
 
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA (1)
* 7,017,043 Methods and systems for the identification of circuits and circuit designs 45 2000
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (11)
5,319,760 Translation buffer for virtual machines with address space match 158 1991
5,488,716 Fault tolerant computer system with shadow virtual processor 99 1994
5,522,075 Protection ring extension for computers having distinct virtual machine monitor and virtual machine address spaces 144 1994
5,421,006 Method and apparatus for assessing integrity of computer system software 463 1994
6,055,637 System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential 375 1996
5,737,604 Method and apparatus for independently resetting processors and cache controllers in multiple processor systems 115 1996
6,061,794 System and method for performing secure device communications in a peer-to-peer bus architecture 255 1997
6,378,072 Cryptographic system 226 1998
6,125,430 Virtual memory allocation in a virtual address space having an inaccessible gap 144 1998
6,275,933 Security system for a computerized apparatus 101 1999
6,988,250 Trusted computing platform using a trusted device assembly 49 2000
 
PARKER-HANNIFIN CORPORATION (1)
5,473,692 Roving software license for a hardware agent 549 1994
 
GLOBALFOUNDRIES INC. (1)
6,044,478 Cache with finely granular locked-down regions 154 1997
 
ABSOLUTE SOFTWARE CORPORATION (1)
6,269,392 Method and apparatus to monitor and locate an electronic device using a secured intelligent agent 175 1997
 
FUJITSU LIMITED (1)
5,361,375 Virtual computer system having input/output interrupt control of virtual machines 125 1993
 
SUN MICROSYSTEMS, INC. (2)
5,255,379 Method for automatically transitioning from V86 mode to protected mode in a computer system using an Intel 80386 or 80486 processor 151 1990
5,987,557 Method and apparatus for implementing hardware protection domains in a system with no memory management unit (MMU) 157 1997
 
MAXIM INTEGRATED PRODUCTS, INC. (1)
6,272,637 Systems and methods for protecting access to encrypted information 120 1997
 
MICROCHIP TECHNOLOGY INCORPORATED (1)
5,469,557 Code protection in microcontroller with EEPROM fuses 114 1993
 
INTELLECTUAL VENTURES II LLC (3)
5,615,263 Dual purpose security architecture with protected internal operating system 194 1995
6,314,409 System for controlling access and distribution of digital property 520 1998
6,188,257 Power-on-reset logic with secure power down capability 98 1999
 
DIGITAL EQUIPMENT CORPORATION (1)
4,319,323 Communications device for data processing system 121 1980
 
ROBERT BOSCH GMBH (1)
4,430,709 Apparatus for safeguarding data entered into a microprocessor 98 1981
 
INTEL CORPORATION (36)
5,075,842 Disabling tag bit recognition and allowing privileged operations to occur in an object-oriented memory protection mechanism 122 1989
5,455,909 Microprocessor with operation capture facility 98 1992
5,386,552 Preservation of a computer system processing state in a mass storage device 202 1994
5,568,552 Method for providing a roving software license from one node to another node 420 1995
5,805,712 Apparatus and method for providing secured communications 270 1995
5,835,594 Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage 152 1996
5,729,760 System for providing first type access to register if processor in first mode and second type access to register if processor not in first mode 128 1996
5,844,986 Secure BIOS 280 1996
5,937,063 Secure boot 233 1996
5,903,752 Method and apparatus for embedding a real-time multi-tasking kernel in a non-real-time operating system 120 1996
5,852,717 Performance optimizations for computer networks utilizing HTTP 284 1996
5,757,919 Cryptographically protected paging subsystem 222 1996
5,978,481 Modem compatible method and apparatus for encrypting data that is transparent to software applications 101 1997
6,058,478 Apparatus and method for a vetted field upgrade 126 1997
6,175,925 Tamper resistant player for scrambled contents 129 1997
6,178,509 Tamper resistant methods and apparatus 142 1997
6,205,550 Tamper resistant methods and apparatus 140 1997
6,357,004 System and method for ensuring integrity throughout post-processing 119 1997
6,249,872 Method and apparatus for increasing security against unauthorized write access to a protected memory 105 1998
6,192,455 Apparatus and method for preventing access to SMRAM space through AGP addressing 120 1998
6,173,417 Initializing and restarting operating systems 158 1998
6,115,816 Optimized security functionality in an electronic system 134 1998
* 6,401,208 Method for BIOS authentication prior to BIOS execution 92 1998
2002/0004,900 METHOD FOR SECURE ANONYMOUS COMMUNICATION 76 1998
6,463,535 System and method for verifying the integrity and authorization of software before execution in a local platform 199 1998
6,282,650 Secure public digital watermark 172 1999
6,389,537 Platform and method for assuring integrity of trusted agent communications 221 1999
6,633,981 Electronic system and method for controlling access through user authentication 121 1999
6,535,988 System for detecting over-clocking uses a reference signal thereafter preventing over-clocking by reducing clock rate 111 1999
6,374,317 Method and apparatus for initializing a computer interface 116 1999
6,507,904 Executing isolated mode instructions in a secure system running in privilege rings 139 2000
6,633,963 Controlling access to multiple memory zones in an isolated execution environment 145 2000
2003/0002,668 Multi-level, multi-dimensional content protections 23 2001
2002/0154,782 System and method for key distribution to maintain secure communication 44 2002
7,028,149 System and method for resetting a platform configuration register 41 2002
7,165,181 System and method for establishing trust without revealing identity 23 2002
 
ATI TECHNOLOGIES ULC (1)
6,321,314 Method and apparatus for restricting memory access 162 1999
 
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (1)
5,901,229 Electronic cash implementing method using a trustee 65 1996
 
MITSUBISHI DENKI KABUSHIKI KAISHA (1)
6,101,584 Computer system and semiconductor device on one chip including a memory and central processing unit for making interlock access to the memory 101 1997
 
TEXAS INSTRUMENTS INCORPORATED (1)
4,521,852 Data processing device formed on a single semiconductor substrate having secure memory 121 1982
 
STMICROELECTRONICS S.A. (1)
7,133,990 System and method for controlling access to protected data stored in a storage unit 21 2002
 
MICROSEMI SEMICONDUCTOR (U.S.) INC. (1)
5,901,225 System and method for performing software patches in embedded systems 132 1996
 
Amdahl Corporation (1)
5,574,936 Access control mechanism controlling access to and logical purging of access register translation lookaside buffer (ALB) in a computer system 106 1995
 
IDENTIX INCORPORATED (1)
2001/0027,527 Secure transaction system 186 2001
 
SILICON STORAGE TECHNOLOGY, INC. (1)
6,292,874 Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges 160 1999
 
GEMALTO SA (1)
5,900,606 Method of writing information securely in a portable medium 81 1996
 
SEIKO EPSON CORPORATION (1)
6,088,262 Semiconductor device and electronic equipment having a non-volatile memory with a security function 109 1998
 
SCSK CORPORATION (1)
6,301,646 Pointer verification system and method 101 1999
 
SCOTT MOTORS COMPANY, THE (1)
4,910,774 Method and system for suthenticating electronic memory cards 152 1988
 
Silicon Systems Design Ltd. (1)
6,014,745 Protection for customer programs (EPROM) 110 1997
 
Codex Technologies, Inc. (2)
6,463,537 Modified computer motherboard security and identification system 167 1999
2003/0018,892 Computer with a modified north bridge, security engine and smart card having a secure boot capability and method for secure booting a computer 125 2001
 
Schlumberger Systémes (1)
6,435,416 Method of authenticating a personal code of a user of an integrated circuit card 80 2000
 
FREESCALE SEMICONDUCTOR, INC. (1)
5,737,760 Microcontroller with security logic circuit which prevents reading of internal memory by external program 162 1995
 
MICRON TECHNOLOGY, INC. (1)
5,970,147 System and method for configuring and registering a cryptographic device 177 1997
 
XEROX CORPORATION (1)
2003/0231,328 Multiple printer driver 53 2002
 
CEVA IRELAND LIMITED (1)
6,282,651 Security system protecting data with an encryption key 102 1999
 
KINGLITE HOLDINGS INC. (1)
6,557,104 Method and apparatus for secure processing of cryptographic keys 239 1997
 
SUMITOMO BANK OF NEW YORK TRUST COMPANY (1)
6,378,068 Suspend/resume capability for a protected mode microprocesser 184 1995
 
UTMC MICROELECTRONIC SYSTEMS INC. (1)
5,079,737 Memory management unit for the MIL-STD 1750 bus 101 1988
 
VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY (1)
4,759,064 Blind unanticipated signature systems 248 1985
 
PURE FILL CORPORATION (1)
5,582,717 Water dispenser with side by side filling-stations 135 1993
 
POLYCOM, INC. (1)
5,987,131 Cryptographic key exchange using pre-computation 52 1997
 
ROCKWELL COLLINS, INC. (1)
6,374,286 Real time processor capable of concurrently running multiple independent JAVA machines 310 1998
 
SCALEMP INC. (1)
2005/0039,180 Cluster-based operating system-agnostic virtual computing system 47 2004
 
MICROSOFT TECHNOLOGY LICENSING, LLC (6)
4,974,159 Method of transferring control in a multitasking computer system 58 1988
5,815,665 System and method for providing trusted brokering services over a distributed network 673 1996
5,872,844 System and method for detecting fraudulent expenditure of transferable electronic assets 69 1996
6,473,800 Declarative permission requests in a computer system 214 1998
6,330,670 Digital rights management operating system 461 1999
6,871,276 Controlled-content recoverable blinded certificates 17 2000
 
FUJITSU SIEMENS COMPUTERS GMBH (1)
6,339,816 Method for improving controllability in data processing system with address translation 102 2000
 
PANTAURUS LLC (1)
6,272,533 Secure computer system and method of providing secure access to a computer system including a stand alone switch operable to inhibit data corruption on a storage device 142 1999
 
SCHLUMBERGER TECHNOLOGIES, INC. (1)
6,308,270 Validating and certifying execution of a software program with a smart card 101 1998
 
VMWARE, INC. (3)
6,496,847 System and method for virtualizing computer systems 305 1998
6,397,242 Virtualization system including a virtual machine monitor for a computer with a segmented architecture 316 1998
6,944,699 System and method for facilitating context-switching in a multi-context computer system 85 2002
 
Tokyo Shibaura Denki Kabushiki Kaisha (1)
4,621,318 Multiprocessor system having mutual exclusion control function 73 1983
 
CP8 TECHNOLOGIES (14)
4,825,052 Method and apparatus for certifying services obtained using a portable carrier such as a memory card 162 1986
4,795,893 Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical power 96 1987
4,907,270 Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line 113 1988
4,907,272 Method for authenticating an external authorizing datum by a portable object, such as a memory card 96 1988
5,293,424 Secure memory card 244 1992
5,434,999 Safeguarded remote loading of service programs by authorizing loading in protected memory zones in a terminal 106 1993
5,479,509 Method for signature of an information processing file, and apparatus for implementing it 216 1994
5,533,126 Key protection device for smart cards 88 1994
5,528,231 Method for the authentication of a portable object by an offline terminal, and apparatus for implementing the process 105 1994
5,442,645 Method for checking the integrity of a program or data, and apparatus for implementing this method 189 1994
5,566,323 Data processing system including programming voltage inhibitor for an electrically erasable reprogrammable nonvolatile memory 91 1994
5,867,577 Method and apparatus for authenticating a data carrier intended to enable a transaction or access to a service or a location, and corresponding carrier 109 1995
5,825,875 Process for loading a protected storage zone of an information processing device, and associated device 127 1995
5,796,835 Method and system for writing information in a data carrier making it possible to later certify the originality of this information 76 1997
 
SILICON GRAPHICS INTERNATIONAL CORP. (2)
6,148,379 System, method and computer program product for page sharing between fault-isolated cells in a distributed shared memory system 107 1997
6,182,089 Method, system and computer program product for dynamically allocating large memory pages of different sizes 125 1997
 
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITY (1)
6,075,938 Virtual machine monitors for scalable multiprocessors 407 1998
 
Dell USA, L.P. (1)
5,657,445 Apparatus and method for limiting access to mass storage devices in a computer system 165 1996
 
LENOVO (SINGAPORE) PTE LTD. (1)
5,022,077 Apparatus and method for preventing unauthorized access to BIOS in a personal computer system 193 1989
 
Real Time, Inc. (1)
6,412,035 Apparatus and method for decreasing the response times of interrupt service routines 114 1998
 
AGATE LOGIC, INC. (1)
* 2002/0150,252 Secure intellectual property for a generated field programmable gate array 34 2002
 
GREENLIANT LLC (2)
6,339,815 Microcontroller system having allocation circuitry to selectively allocate and/or hide portions of a program memory address space 154 1998
6,505,279 Microcontroller system having security circuitry to selectively lock portions of a program memory address space 99 1998
 
SYNGENTA LIMITED (1)
5,721,222 Heterocyclic ketones 76 1995
 
BOZAK INVESTMENTS, LLC (1)
5,459,867 Kernels, description tables, and device drivers 203 1993
 
NOVELPOINT SECURITY LLC (1)
6,212,635 Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place 231 1998
 
SMART LINK LTD. (1)
6,092,095 Real-time task manager for a personal computer 150 1996
 
ZERO-KNOWLEDGE SYSTEMS INTERNATIONAL, INC. (1)
5,606,617 Secret-key certificates 210 1994
 
INFOSPACE, INC. (1)
4,529,870 Cryptographic identification, financial transaction, and credential device 421 1982
 
Entrust Technologies Limited (1)
6,363,485 Multi-factor biometric authenticating device and method 183 1998
 
SAFENET, INC. (1)
6,282,657 Kernel mode protection 125 1998
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
5,796,845 Sound field and sound image control apparatus and method 107 1997
 
MCAFEE, INC. (1)
5,459,869 Method for providing protected mode services for device drivers and other resident software 128 1994
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
MICROSOFT TECHNOLOGY LICENSING, LLC (1)
* 7,802,110 System and method for secure execution of program code 3 2004
 
CARNEGIE MELLON UNIVERSITY (1)
8,578,483 Systems and methods for preventing unauthorized modification of an operating system 0 2008
 
DELL PRODUCTS L.P. (1)
* 8,103,862 Self test initialization 1 2008
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
7.5 Year Payment $3600.00 $1800.00 $900.00 Jun 11, 2015
11.5 Year Payment $7400.00 $3700.00 $1850.00 Jun 11, 2019
Fee Large entity fee small entity fee micro entity fee
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00