×

Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication

  • US 10,185,835 B2
  • Filed: 07/31/2017
  • Issued: 01/22/2019
  • Est. Priority Date: 10/24/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a first and second data processing apparatus that are communicatively coupled, the method comprising:

  • obtaining, by the first data processing apparatus, one or more signals from one or more sensors communicatively coupled to the first data processing apparatus;

    determining, by the first data processing apparatus, a varying trust level in the operating security state of the first data processing apparatus by applying at least one of a scaling function, identity function, assignment function, step function, artificial neural network, and machine learning techniques to the one or more signals from the one or more sensors to determine a first TTS measurement;

    determining, by the first data processing apparatus, at least two trust levels from the one or more signals, wherein each trust level is determined independently of any other trust level;

    creating a third trust level by combining the at least two trust levels;

    transmitting, by the first data processing apparatus to the second data processing apparatus, the first TTS measurement, wherein the second data processing apparatus is operating in a first operating security state; and

    changing, by the second data processing apparatus after receiving the first TTS measurement, from the first operating security state of the second data processing apparatus to a second operating security state by at least one of control, direction, manipulation, limitation, activation, and deactivation of at least one of a plurality of operating security states of the second data processing apparatus;

    wherein the first data processing apparatus and the second data processing apparatus are communicatively coupled by a first communication method;

    wherein the changing from the first operating security state to the second operating security state by the second data processing apparatus comprises;

    determining, by the second data processing apparatus, a TTS state using tailored trustworthy space rules (“

    TTS rules”

    ) and the first TTS measurement received from the first data processing apparatus;

    wherein the determining, by the first data processing apparatus, one of the at least two trust levels further comprises;

    using data from at least one TTS rule, wherein the data comprises one or more of a historical trust level and a historical value for one of the one or more signals used in determining one of the at least two trust levels; and

    wherein machine learning techniques are used to determine if the first data processing apparatus is currently operating in one of a typical way and an atypical way.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×