blank Quick help
blank Maintenance news

Scheduled maintenance

Regular maintenance outages:
between 05.00 and 05.15 hrs CET (Monday to Sunday).

Other outages
Availability
Register Forum

2022.02.11

More...
blank News flashes

News flashes

New version of the European Patent Register - SPC information for Unitary Patents.

2024-03-06

More...
blank Related links

Extract from the Register of European Patents

EP About this file: EP2819057

EP2819057 - Data processing system, method of initializing a data processing system, and computer program product [Right-click to bookmark this link]
StatusNo opposition filed within time limit
Status updated on  15.06.2018
Database last updated on 26.06.2024
FormerThe patent has been granted
Status updated on  07.07.2017
FormerGrant of patent is intended
Status updated on  12.04.2017
Most recent event   Tooltip17.07.2020Lapse of the patent in a contracting state
New state(s): AL
published on 19.08.2020  [2020/34]
Applicant(s)For all designated states
NXP B.V.
High Tech Campus 60
5656 AG Eindhoven / NL
[2015/01]
Inventor(s)01 / van Roermund, Timotheus Arthur
NXP Semiconductors, Intellectual Property &
Licensing
High Tech Campus 60
5656 AG Eindhoven / NL
02 / Moerman, Cornelis Marinus
NXP Semiconductors, Intellectual Property &
Licensing
High Tech Campus 60
5656 AG Eindhoven / NL
03 / Rombouts, Peter Maria Franciscus
NXP Semiconductors, Intellectual Property &
Licensing
High Tech Campus 60
5656 AG Eindhoven / NL
 [2015/01]
Representative(s)Krott, Michel
NXP B.V.
Intellectual Property & Licensing
High Tech Campus 60
5656 AG Eindhoven / NL
[2015/01]
Application number, filing date13173426.124.06.2013
[2015/01]
Filing languageEN
Procedural languageEN
PublicationType: A1 Application with search report 
No.:EP2819057
Date:31.12.2014
Language:EN
[2015/01]
Type: B1 Patent specification 
No.:EP2819057
Date:09.08.2017
Language:EN
[2017/32]
Search report(s)(Supplementary) European search report - dispatched on:EP30.04.2014
ClassificationIPC:G06F21/62, H04L29/06
[2015/01]
CPC:
H04L63/105 (EP,US); G06F21/6209 (EP,US); H04L63/061 (US);
G06F2221/2113 (EP,US); H04L63/0823 (EP,US)
Designated contracting statesAL,   AT,   BE,   BG,   CH,   CY,   CZ,   DE,   DK,   EE,   ES,   FI,   FR,   GB,   GR,   HR,   HU,   IE,   IS,   IT,   LI,   LT,   LU,   LV,   MC,   MK,   MT,   NL,   NO,   PL,   PT,   RO,   RS,   SE,   SI,   SK,   SM,   TR [2015/33]
Former [2015/01]AL,  AT,  BE,  BG,  CH,  CY,  CZ,  DE,  DK,  EE,  ES,  FI,  FR,  GB,  GR,  HR,  HU,  IE,  IS,  IT,  LI,  LT,  LU,  LV,  MC,  MK,  MT,  NL,  NO,  PL,  PT,  RO,  RS,  SE,  SI,  SK,  SM,  TR 
TitleGerman:Datenverarbeitungssystem, Verfahren zur Initialisierung eines Datenverarbeitungssystems und Computerprogrammprodukt[2015/01]
English:Data processing system, method of initializing a data processing system, and computer program product[2015/01]
French:Système de traitement de données, procédé d'initialisation d'un système de traitement de données et produit de programme informatique[2015/01]
Examination procedure26.03.2014Examination requested  [2015/01]
23.07.2014Amendment by applicant (claims and/or description)
13.04.2017Communication of intention to grant the patent
01.06.2017Fee for grant paid
01.06.2017Fee for publishing/printing paid
01.06.2017Receipt of the translation of the claim(s)
Divisional application(s)The date of the Examining Division's first communication in respect of the earliest application for which a communication has been issued is  13.04.2017
Opposition(s)11.05.2018No opposition filed within time limit [2018/29]
Fees paidRenewal fee
30.06.2015Renewal fee patent year 03
30.06.2016Renewal fee patent year 04
30.06.2017Renewal fee patent year 05
Opt-out from the exclusive  Tooltip
competence of the Unified
Patent Court
See the Register of the Unified Patent Court for opt-out data
Responsibility for the accuracy, completeness or quality of the data displayed under the link provided lies entirely with the Unified Patent Court.
Lapses during opposition  TooltipHU24.06.2013
AL09.08.2017
AT09.08.2017
CY09.08.2017
CZ09.08.2017
DK09.08.2017
EE09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
IT09.08.2017
LT09.08.2017
LV09.08.2017
MC09.08.2017
MK09.08.2017
NL09.08.2017
PL09.08.2017
PT09.08.2017
RO09.08.2017
RS09.08.2017
SE09.08.2017
SI09.08.2017
SK09.08.2017
SM09.08.2017
TR09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
[2020/34]
Former [2020/31]HU24.06.2013
AT09.08.2017
CY09.08.2017
CZ09.08.2017
DK09.08.2017
EE09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
IT09.08.2017
LT09.08.2017
LV09.08.2017
MC09.08.2017
MK09.08.2017
NL09.08.2017
PL09.08.2017
PT09.08.2017
RO09.08.2017
RS09.08.2017
SE09.08.2017
SI09.08.2017
SK09.08.2017
SM09.08.2017
TR09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2020/28]HU24.06.2013
AT09.08.2017
CZ09.08.2017
DK09.08.2017
EE09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
IT09.08.2017
LT09.08.2017
LV09.08.2017
MC09.08.2017
NL09.08.2017
PL09.08.2017
PT09.08.2017
RO09.08.2017
RS09.08.2017
SE09.08.2017
SI09.08.2017
SK09.08.2017
SM09.08.2017
TR09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2020/15]AT09.08.2017
CZ09.08.2017
DK09.08.2017
EE09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
IT09.08.2017
LT09.08.2017
LV09.08.2017
MC09.08.2017
NL09.08.2017
PL09.08.2017
RO09.08.2017
RS09.08.2017
SE09.08.2017
SI09.08.2017
SK09.08.2017
SM09.08.2017
TR09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2019/15]AT09.08.2017
CZ09.08.2017
DK09.08.2017
EE09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
IT09.08.2017
LT09.08.2017
LV09.08.2017
MC09.08.2017
NL09.08.2017
PL09.08.2017
RO09.08.2017
RS09.08.2017
SE09.08.2017
SI09.08.2017
SK09.08.2017
SM09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2018/39]AT09.08.2017
CZ09.08.2017
DK09.08.2017
EE09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
IT09.08.2017
LT09.08.2017
LV09.08.2017
NL09.08.2017
PL09.08.2017
RO09.08.2017
RS09.08.2017
SE09.08.2017
SI09.08.2017
SK09.08.2017
SM09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2018/25]AT09.08.2017
CZ09.08.2017
DK09.08.2017
EE09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
IT09.08.2017
LT09.08.2017
LV09.08.2017
NL09.08.2017
PL09.08.2017
RO09.08.2017
RS09.08.2017
SE09.08.2017
SK09.08.2017
SM09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2018/21]AT09.08.2017
CZ09.08.2017
DK09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
LT09.08.2017
LV09.08.2017
NL09.08.2017
PL09.08.2017
RS09.08.2017
SE09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2018/12]AT09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
LT09.08.2017
LV09.08.2017
NL09.08.2017
PL09.08.2017
RS09.08.2017
SE09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2018/11]AT09.08.2017
ES09.08.2017
FI09.08.2017
HR09.08.2017
LT09.08.2017
NL09.08.2017
PL09.08.2017
RS09.08.2017
SE09.08.2017
BG09.11.2017
NO09.11.2017
GR10.11.2017
IS09.12.2017
Former [2018/10]AT09.08.2017
FI09.08.2017
HR09.08.2017
LT09.08.2017
NL09.08.2017
RS09.08.2017
SE09.08.2017
NO09.11.2017
Former [2018/09]FI09.08.2017
LT09.08.2017
NL09.08.2017
SE09.08.2017
NO09.11.2017
Former [2018/08]FI09.08.2017
LT09.08.2017
NL09.08.2017
NO09.11.2017
Former [2018/07]LT09.08.2017
NO09.11.2017
Documents cited:Search[IY]US2005234907  (YAMAGISHI YASUAKI [JP], et al) [I] 1-4,9-11 * the whole document * [Y] 3,4;
 [Y]US2002144117  (FAIGLE CHRISTOPHER T [US]) [Y] 3 * the whole document * * figure 3; claim 1 *;
 [YA]US6449720  (SPRAGUE STEVEN K [US], et al) [Y] 4 * Securely exporting and importing through encryption and decryption a security context of a running security program from a cryptographic processor to an external hard drive corresponds to moving temporarily secrets out from a high security level to a lower security level.;; claim 6 * [A] 5,8;
 [Y]EP0407060  (AMERICAN TELEPHONE & TELEGRAPH [US]) [Y] 6,7 * the whole document *;
 [Y]US2010146295  (PROUDLER GRAEME JOHN [GB]) [Y] 7 * paragraph [0073] - paragraph [0085]; figures 11-15 *
 [I]  - SANDHU R S ET AL, "ACCESS CONTROL: PRINCIPLES AND PRACTICE", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, US, (19940901), vol. 32, no. 9, doi:10.1109/35.312842, ISSN 0163-6804, pages 40 - 48, XP000476554 [I] 1,10 * page 44 - page 45 *

DOI:   http://dx.doi.org/10.1109/35.312842
 [XI]  - SINCLAIR S ET AL, "PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness", COMPUTER SECURITY APPLICATIONS CONFERENCE, 21ST ANNUAL TUCSON, AZ, USA 05-09 DEC. 2005, PISCATAWAY, NJ, USA,IEEE, (20051205), doi:10.1109/CSAC.2005.43, ISBN 978-0-7695-2461-0, pages 419 - 430, XP010869960 [X] 1,8,10,11 * the whole document * [I] 5

DOI:   http://dx.doi.org/10.1109/CSAC.2005.43
 [Y]  - Biba, "INTEGRITY CONSIDERATIONS FOR SECURE COMPUTER SYSTEMS", (19770401), URL: http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA039324, (20140416), XP055114406 [Y] 6,7 * See a low-water mark integrity audit policy.; page 30 - page 31 *
The EPO accepts no responsibility for the accuracy of data originating from other authorities; in particular, it does not guarantee that it is complete, up to date or fit for specific purposes.