Secure clock on computing device such as may be required in connection with a trust-based system
First Claim
1. A computing device having:
- a running real-time secure clock that can only be adjusted according to trusted time as received from a trusted time authority external to the computing device, whereby a user of the computing device cannot adjust the secure clock;
a time offset within which is stored a time value that can be adjusted by at least one of the user and the trusted time authority; and
a time display for displaying a running real-time display time to the user of such computing device, the display time being calculated as the trusted time from the secure clock plus the stored time value in the time offset. wherein reference may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing device has a running real-time secure clock adjustable only according to trusted time as received from an external trusted time authority, a time offset within which is stored a time value adjustable by at least one of the user and the trusted time authority, and a time display for displaying a running real-time display time calculated as the trusted time from the secure clock plus the stored time value in the time offset. Reference thus may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement. The computing device sends a request for secure time and the trusted time authority sends same. The computing device receives the secure time, sets the secure clock according to same, and sends confirmation to the trusted time authority that the secure time has been received.
-
Citations
31 Claims
-
1. A computing device having:
-
a running real-time secure clock that can only be adjusted according to trusted time as received from a trusted time authority external to the computing device, whereby a user of the computing device cannot adjust the secure clock;
a time offset within which is stored a time value that can be adjusted by at least one of the user and the trusted time authority; and
a time display for displaying a running real-time display time to the user of such computing device, the display time being calculated as the trusted time from the secure clock plus the stored time value in the time offset. wherein reference may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method in combination with a computing device having a running real-time secure clock that a user of the computing device cannot adjust, the secure clock for maintaining trusted time employed to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement, the method for obtaining the trusted time from a trusted time authority external to the computing device and comprising the computing device in response to sending a request for secure time:
-
receiving new secure time for the secure clock;
setting the secure clock according to the received current secure time; and
sending confirmation that the new secure time has been received. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A method in combination with a computing device having a running real-time secure clock that a user of the computing device cannot adjust, the secure clock for maintaining trusted time employed to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement, the method for transmitting the trusted time from a trusted time authority external to the computing device and comprising the trusted time authority in response to a received request for secure time:
-
sending secure time for the secure clock; and
receiving in response confirmation that the sent secure time has been received. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer-readable medium having stored thereon computer-executable instructions for performing a method in combination with a computing device having a running real-time secure clock that a user of the computing device cannot adjust, the secure clock for maintaining trusted time employed to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement, the method for obtaining the trusted time from a trusted time authority external to the computing device and comprising the computing device in response to sending a request for secure time:
-
receiving new secure time for the secure clock;
setting the secure clock according to the received current secure time; and
sending confirmation that the new secure time has been received. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer-readable medium having stored thereon computer-executable instructions for performing a method in combination with a computing device having a running real-time secure clock that a user of the computing device cannot adjust, the secure clock for maintaining trusted time employed to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement, the method for transmitting the trusted time from a trusted time authority external to the computing device and comprising the trusted time authority in response to a received request for secure time:
-
sending secure time for the secure clock; and
receiving in response confirmation that the sent secure time has been received. - View Dependent Claims (28, 29, 30, 31)
-
Specification