Method and system to protect software-based network-connected devices from advanced persistent threat
First Claim
1. A method comprising:
- authenticating executable program instructions of a network-connected device using routines installed at a low level of the network device and being correlated to memory instructions holding executable program instructions;
detecting the presence of rogue software in the memory instructions of the network-connected device by running the routines prior to the device running the executable program instructions; and
in response to detecting the presence of rogue software, locking down communications of the network-connected device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of protecting a network-connected device from an advanced persistent threat cyber-attack is provided. A network-connected device having an operating system, a memory, memory instructions holding executable program instructions, and being communication enabled, is protected from an advanced persistent threat by steps of detecting the advanced persistent threat due to the presence of rogue software in the memory instructions of the network-connected device and locking-down the communications of the network-connected device. The network-connected device may be provided with low-level routines that are correlated to the memory instructions. Detecting the advanced persistent threat may be comprised of authenticating the memory instructions of the network-connected device by using the installed low-level routines.
604 Citations
20 Claims
-
1. A method comprising:
-
authenticating executable program instructions of a network-connected device using routines installed at a low level of the network device and being correlated to memory instructions holding executable program instructions; detecting the presence of rogue software in the memory instructions of the network-connected device by running the routines prior to the device running the executable program instructions; and in response to detecting the presence of rogue software, locking down communications of the network-connected device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network-connected device, comprising:
-
an operating system; a central processing unit; a memory; executable program instructions loaded into the memory; and routines installed in a low-level of the network-connected device, the routines being correlated to the executable program instructions before the network-connected device is deployed for the first time; wherein the central processing unit is configured to allow the routines to authenticate the executable program instructions before the central processing unit executes the program instructions; and wherein the routines are configured to lock down communications between the network-connected device and other devices if the routines find instructions in the memory which do not correlate to the executable program instructions in the memory. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification