US Patent No: 7,457,951

Number of patents in Portfolio can not be more than 2000

Data integrity monitoring in trusted computing entity

1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method of security monitoring of data files in a computer platform is carried out by a trusted component having a processor and trusted memory area. The method comprises creating one or a plurality of data files in an untrusted memory area of said computing platform, for each created data file, periodically generating a digest data by applying a hash function to each data file, storing the digest data in a trusted memory area and for each file periodically comparing a current digest data of the file with a previously generated digest data of the file. Any differences between a previous and a current digest data indicate that a file in the untrusted memory area has been corrupted.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.HOUSTON, TX27741

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Balacheff, Boris Keynsham, GB 30 342
Proudler, Graeme John Gifford, GB 62 535

Cited Art Landscape

Patent Info (Count) # Cites Year
 
MICROSOFT CORPORATION (8)
6,253,324 Server verification of requesting clients 34 1997
6,327,652 Loading and identifying a digital rights management operating system 424 1999
6,330,670 Digital rights management operating system 453 1999
6,609,199 Method and apparatus for authenticating an open system application to a portable IC device 182 1999
6,697,944 Digital content distribution, transmission and protection system and method, and portable device for use therewith 412 1999
6,757,824 Client-side boot domains and boot rules 35 1999
6,948,073 Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client 26 2001
2002/0012,432 Secure video card in computing device having digital rights management (DRM) system 81 2001
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (4)
6,507,909 Method for executing trusted-path commands 22 1990
5,421,006 Method and apparatus for assessing integrity of computer system software 457 1994
6,785,015 System and method for monitoring a computer system process or peripheral 43 1999
2002/0023,212 Performance of a service on a computing platform 43 2001
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (4)
5,032,979 Distributed security auditing subsystem for an operating system 320 1990
5,404,532 Persistent/impervious event forwarding discriminator 33 1993
5,491,750 Method and apparatus for three-party entity authentication and key distribution using message authentication codes 109 1993
6,772,331 Method and apparatus for exclusively pairing wireless devices 160 1999
 
INTEL CORPORATION (3)
5,844,986 Secure BIOS 277 1996
5,940,513 Parameterized hash functions for access control 56 1997
6,678,833 Protection of boot block data and accurate reporting of boot block contents 16 2000
 
MCAFEE, INC. (3)
5,361,359 System and method for controlling the use of a computer 204 1992
5,815,702 Method and software products for continued application execution after generation of fatal exceptions 31 1996
6,266,774 Method and system for securing, managing or optimizing a personal computer 181 1998
 
INTELLECTUAL VENTURES TRUSTED PLATFORM ASSETS, LLC (2)
5,448,045 System for protecting computers via intelligent tokens or smart cards 165 1993
5,892,902 Intelligent token protected system with network authentication 135 1996
 
ARVATO DIGITAL SERVICES LLC (1)
5,809,145 System for distributing digital information 267 1996
 
AT&T CORP. (1)
5,706,431 System and method for distributively propagating revisions through a communications network 34 1995
 
AVAYA INC. (1)
6,539,425 Policy-enabled communications networks 115 1999
 
BELLSOUTH INTELLECTUAL PROPERTY CORPORATION (1)
6,716,101 System and method for monitoring the location of individuals via the world wide web using a wireless communications network 177 2000
 
CANON KABUSHIKI KAISHA (1)
5,819,261 Method and apparatus for extracting a keyword from scheduling data using the keyword for searching the schedule data file 68 1996
 
CHEYENNE PROPERTY TRUST (1)
5,841,869 Method and apparatus for trusted processing 118 1996
 
CISCO TECHNOLOGY, INC. (1)
6,405,318 Intrusion detection system 265 1999
 
CITRIX SYSTEMS, INC. (1)
6,799,270 System and method for secure distribution of digital information to a chain of computer system nodes in a network 71 1999
 
Codex Technologies, Inc. (1)
2003/0018,892 Computer with a modified north bridge, security engine and smart card having a secure boot capability and method for secure booting a computer 124 2001
 
Data General Corporation (1)
5,937,159 Secure computer system 102 1997
 
Entrust Technologies Limited (1)
6,694,434 Method and apparatus for controlling program execution and program distribution 99 1998
 
GATEWAY, INC. (1)
5,966,732 Method and apparatus for adding to the reserve area of a disk drive 30 1996
 
GENERAL DYNAMICS C4 SYSTEMS, INC. (1)
6,098,133 Secure bus arbiter interconnect arrangement 28 1997
 
GEOSPATIAL TECHNOLOGIES, INC. (1)
6,327,533 Method and apparatus for continuously locating an object 183 2000
 
HELBIG, WALTER A., SR. (1)
6,038,667 Method and apparatus enhancing computer system security 34 1998
 
HEWLETT-PACKARD COMPANY (1)
4,933,969 Data authentication and protection system 89 1988
 
INNOVATIVE SECURITY SYSTEMS, INC. (1)
6,289,462 Trusted compartmentalized computer operating system 225 1999
 
InterTrust Technologies Corp. (1)
5,892,900 Systems and methods for secure transaction management and electronic rights protection 1925 1996
 
JPC, INCORPORATED (1)
5,841,868 Trusted computer system 32 1993
 
KABUSHIKI KAISHA MEIDENSHA (1)
5,890,142 Apparatus for monitoring system condition 21 1996
 
KINGLITE HOLDINGS INC. (1)
2003/0037,237 Systems and methods for computer device authentication 119 2001
 
LBS INNOVATIONS LLC (1)
6,091,956 Situation information system 760 1997
 
LENOVO (SINGAPORE) PTE LTD. (1)
5,341,422 Trusted personal computer system with identification 19 1992
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
6,253,349 Error detective information adding equipment 15 1998
 
MISONIX, INC. (1)
5,572,590 Discrimination of malicious changes to digital information using multiple signatures 98 1994
 
MOTOROLA MOBILITY LLC (1)
6,529,728 Method and apparatus in a wireless communication system for selectively providing information specific to a location 26 2000
 
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (1)
5,701,343 Method and system for digital information protection 66 1995
 
NOKIA MOBILE PHONES LTD. (1)
6,529,143 Information retrieval system 197 1999
 
POWER MANAGEMENT ENTERPRISES, LLC (1)
6,021,510 Antivirus accelerator 130 1997
 
PRICELINE.COM LLC (1)
6,510,418 Method and apparatus for detecting and deterring the submission of similar offers in a commerce system 104 1999
 
RAYTHEON COMPANY (1)
5,283,828 Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems 66 1993
 
RVT TECHNOLOGIES, INC. (1)
6,081,894 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data 55 1997
 
SAP AG (1)
5,774,717 Method and article of manufacture for resynchronizing client/server file systems and resolving file system conflicts 81 1995
 
SECURITY FIRST CORP. (1)
6,853,988 Cryptographic server with provisions for interoperability between cryptographic systems 113 2000
 
SOUND VIEW INNOVATIONS, LLC (1)
6,650,902 Method and apparatus for wireless telecommunications system that provides location-based information delivery to a wireless mobile unit 217 1999
 
STAMPS.COM INC. (1)
6,868,406 Auditing method and system for an on-line value-bearing item printing system 61 2000
 
The Commonwealth of Australia (1)
6,115,819 Secure computer architecture 49 1996
 
TREND MICRO INCORPORATED (1)
5,440,723 Automatic immune system for computers and computer networks 336 1993
 
TWITTER, INC. (1)
6,374,250 System and method for differential compression of data from a plurality of binary sources 110 1997
 
UNICATE B.V. (1)
6,889,325 Transaction method and system for data networks, like internet 51 2000
 
VERIZON PATENT AND LICENSING INC. (1)
5,958,016 Internet-web link for access to intelligent network service control 502 1997
 
WALKER ASSET MANAGEMENT LIMITED PARTNERSHIP (1)
5,768,382 Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols 723 1995
 
WATCHGUARD TECHNOLOGIES, INC. (1)
6,678,827 Managing multiple network security devices from a manager device 174 1999
 
WAYPORT, INC. (1)
6,414,635 Geographic-based communication service system with more precise determination of a user's known geographic location 311 2000
 
WISTRON CORPORATION (1)
5,511,184 Method and apparatus for protecting a computer system from computer viruses 70 1993
 
Other [Check patent profile for assignment information] (4)
5,144,660 Securing a computer against undesired write operations to or read operations from a mass storage device 205 1989
5,359,659 Method for securing software against corruption by computer viruses 176 1992
5,619,571 Method for securely storing electronic records 87 1995
2001/0037,450 System and method for process protection 171 2001

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
SIGNACERT, INC. (6)
8,266,676 Method to verify the integrity of components on a trusted platform using integrity database services 3 2006
7,733,804 Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain 6 2007
8,327,131 Method and system to issue trust score certificates for networked devices using a trust scoring service 1 2007
7,904,727 Method to control access between network endpoints based on trust scores calculated from information system component analysis 8 2009
8,139,588 Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain 1 2010
8,429,412 Method to control access between network endpoints based on trust scores calculated from information system component analysis 0 2010
 
CODESEALER APS (2)
8,201,248 Authenticating a web page with embedded javascript 0 2009
8,789,199 Authenticating a web page with embedded javascript 0 2012
 
INTEL CORPORATION (2)
8,205,238 Platform posture and policy information exchange method and apparatus 3 2006
8,812,704 Method, apparatus and system for platform identity binding in a network node 0 2011
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (2)
8,856,874 Method and apparatus for serving content elements of a markup language document protected against cross-site scripting attack 0 2010
8,825,577 Using penalty and reward to aggregate data to assess trust 0 2010
 
NEXTENDERS (INDIA) PVT. LTD. (2)
8,090,950 System and method for authenticating documents 1 2004
8,782,422 System and method for authenticating documents 0 2011
 
UNILOC LUXEMBOURG S. A. (2)
8,671,060 Post-production preparation of an unprotected installation image for downloading as a protected software product 0 2011
8,613,110 Software piracy prevention through remote enforcement of an activation threshold 0 2012
 
UNILOC USA (2)
8,087,092 Method and apparatus for detection of tampering attacks 3 2006
8,160,962 Installing protected software product using unprotected installation image 0 2008
 
BLUE COAT SYSTEMS, INC. (1)
8,826,411 Client-side extensions for use in connection with HTTP proxy policy enforcement 0 2006
 
BLUE RIDGE NETWORKS, INC. (1)
7,809,955 Trustable communities for a computer system 0 2006
 
BROADCOM CORPORATION (1)
8,677,482 Hardware security for software processes 0 2010
 
CHI MEI COMMUNICATION SYSTEMS, INC. (1)
8,112,124 Electronic device and method for rapidly displaying pictures 0 2009
 
EMC CORPORATION (1)
8,621,649 Providing a security-sensitive environment 0 2011
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
8,219,496 Method of and apparatus for ascertaining the status of a data processing environment 1 2002
 
INFINEON TECHNOLOGIES AG (1)
7,996,742 Circuit arrangement and method for checking the function of a logic circuit in a circuit arrangement 0 2008
 
KASPERSKY LAB ZAO (1)
8,181,247 System and method for protecting a computer system from the activity of malicious objects 1 2011
 
MCAFEE, INC. (1)
8,832,837 Preventing attacks on devices with multiple CPUs 0 2012
 
MICROSOFT CORPORATION (1)
8,732,824 Method and system for monitoring integrity of running computer system 0 2007
 
NTT DOCOMO, INC. (1)
8,056,137 Communication terminal device and computer device 0 2006
 
SAFENET, INC. (1)
8,656,185 High-assurance processor active memory content protection 0 2005

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
7.5 Year Payment $3600.00 $1800.00 $900.00 May 25, 2016
11.5 Year Payment $7400.00 $3700.00 $1850.00 May 25, 2020
Fee Large entity fee small entity fee micro entity fee
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00