System and method for user determination of secure software
First Claim
Patent Images
1. A secure computer system, comprising:
- a central processing unit (CPU);
at least one program residing within the central processing unit; and
a portable device configured for communicating with the program to verify whether the program is trusted, the portable device first determining whether the program is operating in a trusted portion of the CPU, and if not, indicating not verified, otherwise determining whether the program is operating in a trusted mode, and if not, indicating not verified, otherwise indicating verified.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure computer system includes a central processing unit in which plural programs reside. The system includes means for verifying whether the at least one program is trusted or not trusted. That means can be an external key device that includes a verification program that can communicate with the programs residing within the central processing unit.
13 Citations
6 Claims
-
1. A secure computer system, comprising:
-
a central processing unit (CPU); at least one program residing within the central processing unit; and a portable device configured for communicating with the program to verify whether the program is trusted, the portable device first determining whether the program is operating in a trusted portion of the CPU, and if not, indicating not verified, otherwise determining whether the program is operating in a trusted mode, and if not, indicating not verified, otherwise indicating verified. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification