Method and system for embedded, automated, component-level control of computer systems and other complex systems
First Claim
1. A system for securing an automotive system, the system comprising:
- a SIM card;
an agent embedded within the SIM card that, when authorized, enables operation of the SIM card and that, when not authorized, disables operation of the SIM card; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the SIM card.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for protecting and controlling personal computers (“PCs”), components installed in or attached to PCs, and other electronic, mechanical, and electromechanical devices and systems. An exemplary embodiment of the system includes a server running on a remote computer and hardware-implemented agents embedded within the circuitry that controls the various devices within a PC. The agents intercept all communications to and from the devices into which they are embedded, passing the communications when authorized to do so, and blocking communications when not authorized, effectively disabling the devices. Embedded agents are continuously authorized from the remote server computer by handshake operations implemented as communications messages.
-
Citations
2 Claims
-
1. A system for securing an automotive system, the system comprising:
-
a SIM card;
an agent embedded within the SIM card that, when authorized, enables operation of the SIM card and that, when not authorized, disables operation of the SIM card; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the SIM card.
-
-
2. A subscription-based software product, the subscription-based software product comprising:
-
a software program;
an agent embedded in the software program that, when authorized, enables operation of the software program and that, when not authorized, disables operation of the software program; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the software program.
-
Specification