Abstract:
PROBLEM TO BE SOLVED: To provide reliable side band communication between components in a computer system so as to avoid the use of a system bus. SOLUTION: Two components can be connected to each other through a means (an infrared port, a wire, an unused pin or the like) other than a bus; and thereby those kinds of components can communicate with each other without using the system bus. This non-bus communication channel can be called as a side band. By using the side band channel, information (public key or the like) allowing hardware of a user to be identified or other information which the user does not want to be easily intercepted by general public can be communicated. The communication via the side band channel can be used for confirming that things related to the communication are mutually present in a positional relationship with a range limited. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To supply authentication information to be used for a resource provider who supplies a resource to authenticate a resource recipient to the resource recipient. SOLUTION: A resource 12 is acquired from a resource provider (RP) 10 for a resource requester (RR) 14 operating on a computing device 18. The RR 14 is provided with an identify descriptor(id) 20 including security relevance information to designate an environment where the RR 14 is operating. A code identity code(code ID) 22 is calculated based on the loaded RR14 and id 20. The RP 10 verifies that the code ID calculated in the request of the resource 12 is matched with one of one or more valid codes ID 22 for the identified RR 14, and concludes that the RR 14 and id 20 are reliable, and the RP 10 supplies the requested resource 12 to the RR 14, and responds to the transferred request. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To execute, in parallel with each other, a large-scale system having advanced features and a small-scale system for providing high-level security. SOLUTION: An application's functionality is partitioned into two groups depending on whether or not a specific operation like processing of secret data is executed. Separate software objects (processors) are created to perform these two groups of operations. A trusted processor handles secure data and runs in a high-assurance environment. When another processor detects secure data, that data are sent to the trusted processor. The data are wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes the objects to the correct processor, and allows their integrity to be attested through a chain of trust leading back to a base component that is known to be trustworthy. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the received query. At the time of authoring, each scenario solution is organized based upon one or more keywords and/or one or more categories (i.e., namespaces). Data associated with a namespace/keyword corresponding to a returned search result may be mined to determine information beyond basic scenario solution search results that may be of interest to the user. As the namespace(s)/keyword(s) in association with which to organize a particular executable scenario solution is determined by the author of the scenario solution, other information associated with the same namespace/keyword (and/or a namespace/keyword having a relationship thereto) is likely to be more relevant than information organized based upon keywords alone.
Abstract:
A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key. With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.
Abstract:
A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.
Abstract:
Application factoring or partitioning is used to integrate secure features into a conventional application. An application's functionality is partitioned into two sets according to whether a given action does, or does not, involve the handling of sensitive data. Separate software objects (processors) are created to perform these two sets of actions. A trusted processor handles secure data and runs in a high-assurance environment. When another processor encounters secure data, that data is sent to the trusted processor. The data is wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes them to the correct processor, and allows their integrity to be attested through a chain of trust leading back to base component that is known to be trustworthy.