The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Aug. 17, 2010
Filed:
Sep. 22, 2006
Todd W. Arnold, Charlotte, NC (US);
Elizabeth A. Dames, Harrisburg, NC (US);
Carsten D. Frehr, Farum, DK;
Kurt S. Jacobsen, Roskilde, DK;
Michael J. Kelly, Staatsburg, NY (US);
Mark D. Marik, Denver, NC (US);
Jesper Wiese, Lyngby, DK;
Todd W. Arnold, Charlotte, NC (US);
Elizabeth A. Dames, Harrisburg, NC (US);
Carsten D. Frehr, Farum, DK;
Kurt S. Jacobsen, Roskilde, DK;
Michael J. Kelly, Staatsburg, NY (US);
Mark D. Marik, Denver, NC (US);
Jesper Wiese, Lyngby, DK;
International Business Machines Corporation, Armonk, NY (US);
Abstract
A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways.