Data integrity monitoring in trusted computing entity

Number of patents in Portfolio can not be more than 2000

United States of America Patent

PATENT NO 7457951
SERIAL NO

09979903

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method of security monitoring of data files in a computer platform is carried out by a trusted component having a processor and trusted memory area. The method comprises creating one or a plurality of data files in an untrusted memory area of said computing platform, for each created data file, periodically generating a digest data by applying a hash function to each data file, storing the digest data in a trusted memory area and for each file periodically comparing a current digest data of the file with a previously generated digest data of the file. Any differences between a previous and a current digest data indicate that a file in the untrusted memory area has been corrupted.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPHOUSTON, TX9293

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Balacheff, Boris Bristol, GB 35 606
Proudler, Graeme John Bristol, GB 41 896

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (4)
* 5144660 Securing a computer against undesired write operations to or read operations from a mass storage device 219 1989
5359659 Method for securing software against corruption by computer viruses 200 1992
5619571 Method for securely storing electronic records 110 1995
2001/0037,450 System and method for process protection 189 2001
 
TREND MICRO INCORPORATED (1)
5440723 Automatic immune system for computers and computer networks 475 1993
 
DATA GENERAL CORPORATION (1)
5937159 Secure computer system 107 1997
 
WATCHGUARD TECHNOLOGIES, INC. (1)
6678827 Managing multiple network security devices from a manager device 217 1999
 
PRICELINE.COM LLC (1)
6510418 Method and apparatus for detecting and deterring the submission of similar offers in a commerce system 140 1999
 
MCAFEE, LLC (1)
6266774 Method and system for securing, managing or optimizing a personal computer 208 1998
 
RVT TECHNOLOGIES, INC. (1)
6081894 Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data 61 1997
 
AVAYA INC. (1)
6539425 Policy-enabled communications networks 127 1999
 
THE COMMONWEALTH OF AUSTRALIA (1)
6115819 Secure computer architecture 65 1996
 
HELBIG, WALTER A., SR. (1)
6038667 Method and apparatus enhancing computer system security 35 1998
 
GENERAL DYNAMICS MISSION SYSTEMS, INC. (1)
6098133 Secure bus arbiter interconnect arrangement 32 1997
 
RAYTHEON COMPANY (1)
5283828 Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems 66 1993
 
LBS INNOVATIONS LLC (1)
6091956 Situation information system 1070 1997
 
CANON KABUSHIKI KAISHA (1)
* 5819261 Method and apparatus for extracting a keyword from scheduling data using the keyword for searching the schedule data file 79 1996
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (4)
* 5032979 Distributed security auditing subsystem for an operating system 375 1990
5404532 Persistent/impervious event forwarding discriminator 34 1993
5491750 Method and apparatus for three-party entity authentication and key distribution using message authentication codes 129 1993
6772331 Method and apparatus for exclusively pairing wireless devices 245 1999
 
SAP SE (1)
5774717 Method and article of manufacture for resynchronizing client/server file systems and resolving file system conflicts 115 1995
 
HEWLETT-PACKARD COMPANY (1)
* 4933969 Data authentication and protection system 99 1988
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (3)
6507909 Method for executing trusted-path commands 25 1990
5421006 Method and apparatus for assessing integrity of computer system software 487 1994
6785015 System and method for monitoring a computer system process or peripheral 52 1999
 
INTERTRUST TECHNOLOGIES CORPORATION (1)
5892900 Systems and methods for secure transaction management and electronic rights protection 2500 1996
 
BELLSOUTH INTELLECTUAL PROPERTY CORPORATION (1)
6716101 System and method for monitoring the location of individuals via the world wide web using a wireless communications network 286 2000
 
CISCO TECHNOLOGY, INC. (1)
6405318 Intrusion detection system 314 1999
 
SOUND VIEW INNOVATIONS, LLC (1)
6650902 Method and apparatus for wireless telecommunications system that provides location-based information delivery to a wireless mobile unit 300 1999
 
INNOVATIVE SECURITY SYSTEMS, INC. (1)
6289462 Trusted compartmentalized computer operating system 273 1999
 
INTEL CORPORATION (3)
5844986 Secure BIOS 316 1996
5940513 Parameterized hash functions for access control 59 1997
6678833 Protection of boot block data and accurate reporting of boot block contents 20 2000
 
ARVATO DIGITAL SERVICES LLC (1)
5809145 System for distributing digital information 314 1996
 
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (1)
* 5701343 Method and system for digital information protection 72 1995
 
Kabushiki Kaisha Meidensha (1)
5890142 Apparatus for monitoring system condition 23 1996
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (1)
2002/0023,212 Performance of a service on a computing platform 53 2001
 
CODEX TECHNOLOGIES INCORPORATED (1)
2003/0018,892 Computer with a modified north bridge, security engine and smart card having a secure boot capability and method for secure booting a computer 146 2001
 
GeoSpatial Technologies, Inc. (1)
6327533 Method and apparatus for continuously locating an object 228 2000
 
KINGLITE HOLDINGS INC. (1)
2003/0037,237 Systems and methods for computer device authentication 170 2001
 
NOKIA TECHNOLOGIES OY (1)
6529143 Information retrieval system 309 1999
 
STAMPS.COM INC. (1)
6868406 Auditing method and system for an on-line value-bearing item printing system 76 2000
 
POWER MANAGEMENT ENTERPRISES, LLC (1)
* 6021510 Antivirus accelerator 149 1997
 
TWITTER, INC. (1)
* 6374250 System and method for differential compression of data from a plurality of binary sources 125 1997
 
MICROSOFT TECHNOLOGY LICENSING, LLC (8)
* 6253324 Server verification of requesting clients 37 1997
6327652 Loading and identifying a digital rights management operating system 463 1999
6330670 Digital rights management operating system 510 1999
6609199 Method and apparatus for authenticating an open system application to a portable IC device 203 1999
6697944 Digital content distribution, transmission and protection system and method, and portable device for use therewith 517 1999
6757824 Client-side boot domains and boot rules 39 1999
6948073 Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client 29 2001
2002/0012,432 Secure video card in computing device having digital rights management (DRM) system 94 2001
 
MISONIX, INCORPORATED (1)
5572590 Discrimination of malicious changes to digital information using multiple signatures 101 1994
 
SECURITY FIRST CORP. (1)
6853988 Cryptographic server with provisions for interoperability between cryptographic systems 150 2000
 
WALKER ASSET MANAGEMENT LIMITED PARTNERSHIP (1)
* 5768382 Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols 1024 1995
 
LENOVO (SINGAPORE) PTE. LTD. (1)
5341422 Trusted personal computer system with identification 19 1992
 
GOOGLE INC. (1)
6529728 Method and apparatus in a wireless communication system for selectively providing information specific to a location 32 2000
 
JPC, INCORPORATED (1)
5841868 Trusted computer system 33 1993
 
VERIZON PATENT AND LICENSING INC. (1)
5958016 Internet-web link for access to intelligent network service control 582 1997
 
INTELLECTUAL VENTURES TRUSTED PLATFORM ASSETS, LLC (2)
* 5448045 System for protecting computers via intelligent tokens or smart cards 196 1993
* 5892902 Intelligent token protected system with network authentication 168 1996
 
GATEWAY, INC. (1)
* 5966732 Method and apparatus for adding to the reserve area of a disk drive 31 1996
 
UNICATE B.V. (1)
6889325 Transaction method and system for data networks, like internet 68 2000
 
CHEYENNE PROPERTY TRUST (1)
5841869 Method and apparatus for trusted processing 133 1996
 
WISTRON CORPORATION (1)
5511184 Method and apparatus for protecting a computer system from computer viruses 75 1993
 
FACEBOOK, INC. (1)
6414635 Geographic-based communication service system with more precise determination of a user's known geographic location 503 2000
 
ENTRUST TECHNOLOGIES LIMITED (1)
* 6694434 Method and apparatus for controlling program execution and program distribution 137 1998
 
CITRIX SYSTEMS, INC. (1)
6799270 System and method for secure distribution of digital information to a chain of computer system nodes in a network 103 1999
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
* 6253349 Error detective information adding equipment 15 1998
 
AT&T CORP. (1)
5706431 System and method for distributively propagating revisions through a communications network 38 1995
 
MCAFEE, INC. (2)
* 5361359 System and method for controlling the use of a computer 238 1992
5815702 Method and software products for continued application execution after generation of fatal exceptions 33 1996
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Nextenders (India) Private, Ltd. (1)
8782422 System and method for authenticating documents 0 2011
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (1)
8219496 Method of and apparatus for ascertaining the status of a data processing environment 2 2002
 
EMC IP HOLDING COMPANY LLC (1)
8621649 Providing a security-sensitive environment 1 2011
 
KASPERSKY LAB ZAO (1)
* 8181247 System and method for protecting a computer system from the activity of malicious objects 11 2011
 
SAMSUNG ELECTRONICS CO., LTD. (1)
* 2009/0113,546 MEMORY SYSTEM FOR SENSING ATTACK 5 2008
 
TRACER DETECTION CORP. (1)
9818249 Authentication method and system 0 2016
 
NXP B.V. (2)
* 8677482 Hardware security for software processes 0 2010
* 2010/0235,647 Hardware Security for Software Processes 18 2010
 
CODESEALER A/S (3)
8201248 Authenticating a web page with embedded javascript 1 2009
* 2011/0099,629 AUTHENTICATING A WEB PAGE WITH EMBEDDED JAVASCRIPT 3 2009
8789199 Authenticating a web page with embedded javascript 0 2012
 
MCAFEE, LLC (2)
* 8832837 Preventing attacks on devices with multiple CPUs 0 2012
* 2014/0007,234 PREVENTING ATTACKS ON DEVICES WITH MULTIPLE CPUs 0 2012
 
UNILOC LUXEMBOURG S.A. (3)
* 2010/0325,720 System and Method for Monitoring Attempted Network Intrusions 13 2010
8671060 Post-production preparation of an unprotected installation image for downloading as a protected software product 2 2011
8613110 Software piracy prevention through remote enforcement of an activation threshold 1 2012
 
MICROSOFT TECHNOLOGY LICENSING, LLC (3)
* 2007/0101,131 Trusted store tamper detection 8 2005
8732824 Method and system for monitoring integrity of running computer system 2 2007
* 2007/0261,120 Method & system for monitoring integrity of running computer system 24 2007
 
NexTenders (India) Pvt. Ltd. (1)
* 2008/0028,439 System and Method for Authenticating Documents 4 2004
 
Copilot Ventures Fund III LLC (1)
9811671 Authentication method and system 0 2016
 
CANON KABUSHIKI KAISHA (1)
* 2012/0133,988 IMAGE PROCESSING APPARATUS AND METHOD 0 2012
 
BEIJING ZHIGU TECH CO., LTD. (2)
* 8112124 Electronic device and method for rapidly displaying pictures 0 2009
* 2010/0035,660 ELECTRONIC DEVICE AND METHOD FOR RAPIDLY DISPLAYING PICTURES 1 2009
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (3)
9160756 Method and apparatus for protecting markup language document against cross-site scripting attack 0 2010
8856874 Method and apparatus for serving content elements of a markup language document protected against cross-site scripting attack 16 2010
8825577 Using penalty and reward to aggregate data to assess trust 1 2010
 
CISCO TECHNOLOGY, INC. (2)
* 9330255 Method and system for monitoring a computer system 0 2012
* 2013/0298,239 Method and System for Monitoring a Computer System 1 2012
 
APPGUARD LLC, (2)
* 7809955 Trustable communities for a computer system 1 2006
* 2008/0092,235 Trustable communities for a computer system 49 2006
 
KIP SIGN P1 LP (15)
8266676 Method to verify the integrity of components on a trusted platform using integrity database services 21 2006
* 2007/0143,629 METHOD TO VERIFY THE INTEGRITY OF COMPONENTS ON A TRUSTED PLATFORM USING INTEGRITY DATABASE SERVICES 80 2006
7733804 Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain 13 2007
* 2007/0180,495 METHOD AND APPARATUS TO ESTABLISH ROUTES BASED ON THE TRUST SCORES OF ROUTERS WITHIN AN IP ROUTING DOMAIN 22 2007
8327131 Method and system to issue trust score certificates for networked devices using a trust scoring service 16 2007
9450966 Method and apparatus for lifecycle integrity verification of virtual machines 0 2008
* 7904727 Method to control access between network endpoints based on trust scores calculated from information system component analysis 12 2009
* 2009/0144,813 METHOD TO CONTROL ACCESS BETWEEN NETWORK ENDPOINTS BASED ON TRUST SCORES CALCULATED FROM INFORMATION SYSTEM COMPONENT ANALYSIS 0 2009
8139588 Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain 8 2010
* 2010/0218,236 METHOD AND APPARATUS TO ESTABLISH ROUTES BASED ON THE TRUST SCORES OF ROUTERS WITHIN AN IP ROUTING DOMAIN 13 2010
8429412 Method to control access between network endpoints based on trust scores calculated from information system component analysis 1 2010
* 2011/0078,452 METHOD TO CONTROL ACCESS BETWEEN NETWORK ENDPOINTS BASED ON TRUST SCORES CALCULATED FROM INFORMATION SYSTEM COMPONENT ANALYSIS 0 2010
* 2011/0179,477 SYSTEM INCLUDING PROPERTY-BASED WEIGHTED TRUST SCORE APPLICATION TOKENS FOR ACCESS CONTROL AND RELATED METHODS 43 2010
* 9256765 System and method for identifying software changes 0 2012
* 2014/0006,796 SYSTEM AND METHOD FOR IDENTIFYING SOFTWARE CHANGES 1 2012
 
UNILOC USA (4)
* 8087092 Method and apparatus for detection of tampering attacks 4 2006
* 2007/0143,844 METHOD AND APPARATUS FOR DETECTION OF TAMPERING ATTACKS 3 2006
8160962 Installing protected software product using unprotected installation image 1 2008
* 2009/0083,730 Installing Protected Software Product Using Unprotected Installation Image 26 2008
 
INFINEON TECHNOLOGIES AG (2)
* 7996742 Circuit arrangement and method for checking the function of a logic circuit in a circuit arrangement 1 2008
* 2009/0172,489 CIRCUIT ARRANGEMENT AND METHOD FOR CHECKING THE FUNCTION OF A LOGIC CIRCUIT IN A CIRCUIT ARRANGEMENT 0 2008
 
UNIVERSITY OF MARYLAND, BALTIMORE (2)
* 8955104 Method and system for monitoring system memory integrity 2 2005
* 2009/0217,377 Method and system for monitoring system memory integrity 32 2005
 
INTEL CORPORATION (3)
* 8205238 Platform posture and policy information exchange method and apparatus 5 2006
* 2007/0240,197 Platform posture and policy information exchange method and apparatus 11 2006
8812704 Method, apparatus and system for platform identity binding in a network node 0 2011
 
HARRIS CORPORATION (1)
* 2009/0089,860 METHOD AND APPARATUS FOR LIFECYCLE INTEGRITY VERIFICATION OF VIRTUAL MACHINES 45 2008
 
NTT DOCOMO, INC. (2)
* 8056137 Communication terminal device and computer device 0 2006
* 2006/0274,897 Communication terminal device and computer device 0 2006
 
SYMANTEC CORPORATION (3)
* 8826411 Client-side extensions for use in connection with HTTP proxy policy enforcement 5 2006
* 2007/0220,599 Client-side extensions for use in connection with HTTP proxy policy enforcement 7 2006
* 9088604 Systems and methods for treating locally created files as trustworthy 1 2012
 
VIASAT, INC. (1)
* 2010/0071,054 NETWORK SECURITY APPLIANCE 9 2009
 
SAFENET, INC. (1)
* 8656185 High-assurance processor active memory content protection 0 2005
 
NexTenders (India) Pvt. Ltd. (1)
* 8090950 System and method for authenticating documents 1 2004
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
11.5 Year Payment $7400.00 $3700.00 $1850.00 May 25, 2020
Fee Large entity fee small entity fee micro entity fee
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00