Each software component loaded for a verified operating system on a client computer must satisfy a set of boot rules for a boot certificate. A verified operating system identifier is created from the boot certificate. The boot certificate is published and signed by a boot authority that attests to t
Each software component loaded for a verified operating system on a client computer must satisfy a set of boot rules for a boot certificate. A verified operating system identifier is created from the boot certificate. The boot certificate is published and signed by a boot authority that attests to the validity of the operating system booted under the boot certificate. Each software component for the operating system is associated with a component certificate published and signed by the same boot authority that signed the boot certificate. The boot rules determine the validity of the software component based on the contents of the component and boot certificates. The client computer transmits the verified operating system identity and the boot certificate to a server computer, such as a content provider, and the content provider determines whether to trust the verified operating system with its content. Downloaded data is secured on permanent storage through a key derived from the verified operating system identifier. The boot certificate, component certificates, and secured content define the boot domain.
대표청구항▼
1. A computerized method for establishing a boot domain on a client computer comprising:selecting a boot certificate associated with the boot domain;creating a verified operating system identity from the boot certificate; andloading each one of a plurality of operating system components in accordanc
1. A computerized method for establishing a boot domain on a client computer comprising:selecting a boot certificate associated with the boot domain;creating a verified operating system identity from the boot certificate; andloading each one of a plurality of operating system components in accordance with a set of boot rules based on the boot certificate,wherein each of the plurality of operating system components is associated with a component certificate and the set of boot rules comprises:verifying that each component certificate is signed by a boot authority that issued the boot certificate;verifying that each component certificate is valid as of an issue date for the boot certificate; andverifying that each component is not listed in a revocation list associated with the boot certificate. 2. The method of claim 1, further comprising:obtaining a new component certificate to replace an component certificate that is expired as of the issue date of the boot certificate. 3. The method of claim 1, further comprising:obtaining a new component to replace a component that is listed in the revocation list associated with the boot certificate; andobtaining the associated component certificate for the new component. 4. A computerized method for establishing a boot domain on a client computer comprising:selecting a boot certificate associated with the boot domain;creating a verified operating system identity from the boot certificate;loading each one of a plurality of operating system components in accordance with a set of boot rules based on the boot certificate;securing data for use in the boot domain using a key based on the verified identity of the operating system;obtaining a new boot certificate;creating a new verified operating system identity from the new boot certificate; andre-securing the data in the boot domain with the new verified operating system identity. 5. The method of claim 4, further comprising:creating an unverified operating system identity when one of the plurality of operating system components fails the set of boot rules. 6. The method of claim 4,wherein re-securing the data in the boot domain comprises:verifying that the new boot certificate is issued by a boot authority that is the same as the boot authority that issued the boot certificate;verifying that the new boot certificate is issued at a later date than the boot certificate;verifying that the data in the boot domain has not expired;unsealing the data in the boot domain with the verified operating system identity;copying the data; andsealing the copy of the data with the new verified operating system identity. 7. The method of claim 4, wherein the actions are performed in the order recited. 8. A computerized system comprising:a processing unit;a system memory coupled to the processing unit through a system bus;a computer-readable medium coupled to the processing unit through a system bus;a boot manager executed from the computer-readable medium by the processing unit, wherein the boot manager causes the processing unit to request a boot certificate selection from a user of the computerized system;a boot loader executed from the computer-readable medium by the processing unit, wherein the boot loader causes the processing unit to boot subsequent software components based on a set of boot rules for the boot certificate,wherein the boot loader further causes the processing unit to create a verified operating system identity from the boot certificate when the boot rules are satisfied,a wide area network connection coupled to the processing unit; anda verified operating system booted in accordance with the boot rules, wherein the verified operating system causes the processing unit to transmit the verified operating system identity and the boot certificate to a server computer,wherein the verified operating system further causes the processing unit to secure data downloaded from the server computer through the verified operating system identity. 9. The co mputerized system of claim 8, wherein the verified operating system further causes the processing unit to obtain a new boot certificate, to create a new verified operating system identity from the new boot certificate, and to unseal downloaded data secured with the verified operating system identity, and further to re-seal the downloaded data through the new verified operating system identity. 10. A computer-readable medium having computer-executable modules stored thereon, the modules comprising:a boot manager for determining a boot certificate associated with one of a plurality of boot domains; anda boot loader for loading each one of a plurality of operating system components in accordance with a set of boot rules for the boot certificate and further for creating a verified operating system identity from the boot certificate,wherein each of the plurality of operating system components is associated with a component certificate and the set of boot rules comprises:verifying that each component certificate is signed by a boot authority that issued the boot certificate;verifying that each component certificate is valid as of an issue date for the boot certificate; andverifying that each component is not listed in a revocation list associated with the boot certificate. 11. The computer-readable medium of claim 10, wherein the boot manager determines the boot certificate based on user input. 12. The computer-readable medium of claim 10, wherein the boot loader further creates an unverified operating system identify when one of the plurality of operating system components fails the set of boot rules. 13. A method of transferring data between a client and a server computer comprising:obtaining, by the client computer, a boot certificate;loading, by the client computer, a plurality of operating system components as specified by the boot certificate to boot a verified operating system on the client computer;creating, by the client computer, a verified operating system identity for the verified operating system from the boot certificate;transmitting, by the client computer, the verified operating system identity and the boot certificate to the server computer;determining, by the server computer, what data is available to the client computer based on the verified operating system identity and the boot certificate;downloading, by the server computer, the available data to the client computer; andsecuring, by the client computer, the downloaded data on the client computer through the verified operating system identity. 14. The method of claim 13, wherein loading the plurality of operating system components is performed under the control of a different operating system. 15. The method of claim 13, wherein the plurality of operating system components is loaded into a protected address space. 16. A computer-readable medium having computer-executable instructions stored thereon to establish a boot domain on a computer, the instructions comprising:obtaining a boot certificate associated with the boot domain;booting an operating system specified in the boot certificate,wherein booting the operating system comprises:determining a set of boot rules associated with the boot certificate; andevaluating each one of a plurality of components for the operating system for compliance with the boot rules;creating a verified operating system identity from the boot certificate;loading each one of the plurality of components that is in compliance with the boot rules;obtaining a new boot certificate;creating a new verified operating system identity from the new boot certificate; andre-securing the data in the boot domain with the new verified operating system identity. 17. The computer-readable medium of claim 16; further comprising:creating an unverified operating system identity when one of the plurality of components is not in compliance with the boot rules.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (90)
Campbell Randall B., Apparatus and method for remotely executing commands using distributed computing environment remote procedure calls.
Fisher Jerald C. ; Nguyen Lien Dai ; Young James ; Seaburg Gunnar P. ; Hedlund Galen W. ; Katz Richard S., Channel configuration program server architecture.
Takahashi Kikuo (Hachioji JPX) Kagimasa Toyohiko (Hachioji JPX) Mori Toshiaki (Hachioji JPX), Data processing apparatus having a real memory region with a corresponding fixed memory protection key value and method.
Robert G. Atkinson ; James W. Kelly, Jr. ; Bryan W. Tuttle ; Robert M. Price ; Robert P. Reichel, Embedding certifications in executable files for network transmission.
Guillou Louis C. (Rennes FRX) Quisquater Jean-Jacques (Brussels BEX), Method and apparatus for authenticating accreditations and for authenticating and signing messages.
Novoa Manuel ; McCann Paul H. ; Sharum Wayne P. ; Crisan Adrian ; Hokanson Paul B., Method and apparatus for remote ROM flashing and security management for a computer system.
Hennige Hartmut (23 Packman Lane ; Home Green Kirk Ella Hull HU10 7TH N. Humberside GB3), Method and device for simplifying the use of a plurality of credit cards, or the like.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
Grimonprez Georges (Villeneuve d\Asq FRX) Paradinas Pierre (Villeneuve d\Asq FRX), Secured method for loading a plurality of applications into a microprocessor memory card.
Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Barlow Doug ; Dillaway Blair ; Fox Barbara ; Lipscomb Terry ; Spies Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.
Depta, Robert, Computer including at least one connector for a replaceable storage medium, and method for starting and operating a computer via a replaceable storage medium.
Nicolson, Kenneth Alexander; Matsushima, Hideki; Takayama, Hisashi; Ito, Takayuki; Haga, Tomoyuki, Method for finding next component to be booted based on booting status of current component to continue booting process by using a component look-up table.
Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Hunter, Jamie; McMichael, Lonnie Dean; LaSalle, Derek Norman; Jacomet, Pierre; Paley, Mark Eliot; Kurien, Thekkthalackal Varugis; Cross, David B., System and method for protected operating system boot using state validation.
Hunter,Jamie; England,Paul; Humphries,Russell; Thom,Stefan; Schwartz, Jr.,James Anthony; Ray,Kenneth D.; Schwartz,Jonathan, Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module.
Hunter, Jamie; England, Paul; Humphries, Russell; Thom, Stefan; Schwartz, Jr., James Anthony; Ray, Kenneth D.; Schwartz, Jonathan, Systems and methods for controlling access to data on a computer with a secure boot process.
Hunter, Jamie; England, Paul; Humphries, Russell; Thom, Stefan; Schwartz, Jr., James Anthony; Ray, Kenneth D; Schwartz, Jonathan, Systems and methods for securely booting a computer with a trusted processing module.
Hunter, Jamie; England, Paul; Humphries, Russell; Thom, Stefan; Schwartz, Jr., James Anthony; Ray, Kenneth D.; Schwartz, Jonathan, Systems and methods for updating a secure boot process on a computer with a hardware security module.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.