News Focus
News Focus
icon url

weets

12/19/04 11:42 AM

#61369 RE: go-kitesurf #61347

Dear go-kite,

Make no mistake, Wave didn't give anything away. Wave shared their "intellectual brillance" with the gorillas who would have eaten Wave for lunch!!! Wave, really having no choice, was allowed to sit at the table with the big guys because they had all the goodies & many of the trusted computing solutions. Moreover, they were able to port their EMBASSY 2100 solutions & TAN infrastructure to work with the TPM & TCG initiatives. Thus, Wave has emerged as a leader in this "trusted computing" paradigm. They will bring all the fame & fortune that we have all been so patiently been waiting for. 05' will be a year to remember!!! The Best...Carl.
icon url

Emptyhead

12/19/04 1:25 PM

#61399 RE: go-kitesurf #61347

go-kitesurf


If that is true it explains much.
icon url

go-kitesurf

12/20/04 9:37 AM

#61539 RE: go-kitesurf #61347

As a follow up to the post I'm replying to:

http://www.wave.com/news/press_archive/00/001122Patent.html

Lee, MA ­ November 22, 2000, Wave Systems Corp. (NASDAQ:WAVX) today announced it has received two new patents further bolstering its industry-leading Trust @ the Edge architecture for secure digital relationships and commerce over the Internet. With the granting of U.S. Patent # 6,138,239, Method and System For Authenticating and Utilizing Secure Resources In a Computer System, and U.S. Patent # 6,092,202, Method and System for Secure Transactions In a Computer System, Wave Systems continues to define the necessary architectures and capabilities to move the security of Internet based transactions into the user's Trusted Client environment. This intellectual property complements prior patents that Wave has received, including content metering and security mechanisms. These new Trust @ the Edge capabilities are essential for the next generation of digital commerce applications and systems.


United States Patent 6,138,239

Inventors: Veil October 24, 2000
--------------------------------------------------------------------------------
Method and system for authenticating and utilizing secure resources in a computer system
Abstract

A system and method for executing secure transactions on a computer system is disclosed. The computer system includes a memory. In one aspect, the method and system include providing a basic input output system (BIOS) on the computer system, providing a secure peripheral coupled with the computer system, and providing a master security co-processor coupled with the computer system. The BIOS includes first unit for indicating a first trust relationship with the BIOS. The secure peripheral includes second unit for indicating a second trust relationship with the secure peripheral. The master security co-processor is for processing sensitive data on the computer system and includes third unit for indicating a third trust relationship with the master security co-processor. The method and system further includes utilizing the BIOS to verify at least one of the first trust relationship, the second trust relationship, or the third trust relationship using the first unit for indicating the first trust relationship, the second unit for indicating the second trust relationship, or the third unit for indicating the third trust relationship. In another aspect, the method and system are for executing an application utilizing sensitive data on a computer system. The computer system includes a master security co-processor and a secure peripheral. In this aspect, the method and system include establishing a secure channel for communication between the master security co-processor and the secure peripheral for executing a portion of the application and executing the portion of the application by the master security co-processor utilizing the secure channel.

United States Patent 6,092,202

Inventors: Veil, et al. July 18, 2000
--------------------------------------------------------------------------------

Method and system for secure transactions in a computer system

Abstract

A method and system for secure transactions. The method and system comprise a security co-processor and an interface for interfacing the security co-processor to a host computer system. The method and system wherein secure transaction processing is performed locally in the security co-processor and non-secure transaction processing is performed in the host computer system. The method and system further include means for providing trusted input coupled to the security co-processor. In addition, the method and system include a second interface coupled to the security co-processor for receiving sensitive data from a smart card, and a trusted display coupled to the security co-processor for providing true transaction information. One advantage of the method and system in accordance with the present invention is that transactions are protected from unauthorized intrusion and, in addition, participation is proven so that transactions cannot be repudiated. Another advantage is that the method and system maintain compatibility with smart cards technology. Yet another advantage is that, because the security co-processor has functionality, smart cards require built-in functionality only for storing sensitive data including account number and private-key and for providing digital signatures to prove participation. Moreover, smart cards can carry biometric data to be recognized by the method and system for an even more reliable proof of participation and card-holder verification. With less built-in functionality, the smart cards are less complex and less expensive. Finally, the method and system are easily implemented with current technology, and the overall cost of the system is reduced.