Method and apparatus for providing security for a computer system
First Claim
Patent Images
1. A method of providing security for a computer system, the method comprising the acts of:
- generating a request for a file;
receiving the request at a dedicated security processor;
using the dedicated security processor to access the file;
using the dedicated security processor to validate the requested file; and
providing the file to an other processor, if the requested file is validated.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for providing security for a computer system, which includes generating a request for a file. The request is received at a dedicated security processor, where the dedicated security processor may access the file to validate the requested file. Upon determining that the requested file is valid, the dedicated security processor may provide the requested file to another processor.
-
Citations
32 Claims
-
1. A method of providing security for a computer system, the method comprising the acts of:
-
generating a request for a file;
receiving the request at a dedicated security processor;
using the dedicated security processor to access the file;
using the dedicated security processor to validate the requested file; and
providing the file to an other processor, if the requested file is validated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of providing security for a computer system, the method comprising the acts of:
-
generating an identifying number from a security processor;
providing the identifying number to an other processor in the computer system;
incorporating the identifying number into a request for a file;
delivering the request to the security processor;
using the security processor to access the file;
using the security processor to validate the requested file;
verifying the identifying number at the security processor; and
providing the file, if the requested file is validated and the identifying number is verified. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer system comprising:
means for validating a file at a security processor, wherein the means for validating the file comprises;
means for storing a record in a memory used to validate the file;
means for verifying the record against the file at the security processor; and
means for indicating that the file is verified to an other processor. - View Dependent Claims (25, 26, 27)
-
28. A networked computer system comprising:
-
a plurality of computer systems;
a network coupled to each of the plurality of computer systems;
at least one of the plurality of computer systems comprising;
a first processor;
a security processor operatively coupled to the first processor;
a first section of memory configured to store a file, the first section of memory being operatively coupled to the first processor and the security processor; and
a second section of memory being configured to store a validation program that is initiated by the security processor, the validation program having a validation routine configured to validate the file stored in the first section of memory when the security processor receives a request for the file, and the validation program using an encrypted code to validate the file. - View Dependent Claims (29, 30, 31, 32)
-
Specification