System method and model for maintaining device integrity and security among intermittently connected interoperating devices
First Claim
1. A method for limiting access to and or the understanding of resources or capabilities of an interoperability application package and or resources or capabilities of interoperability devices, the method comprising:
- (1) forming a basis for security using at least a plurality of the following steps;
(a) automatically collecting an entropy state measure associated with the device;
(b) generating a key pair;
(c) generating a device Id; and
(d) storing the key pairs, device id, and the entropy state measure on the device for continued use whenever the device is active;
(2) forming rules for allowing or preventing the limiting access; and
(3) using the formed basis and formed rules to provide a security task at least for the device.
5 Assignments
0 Petitions
Accused Products
Abstract
System, device, method, and computer program and computer program products for providing communicating between devices having similar or dissimilar characteristics and facilitating seamless interoperability between them. Computer program software and methods of and systems and devices for sharing of content, applications, resources and control across similar and dissimilar permanently or intermittently connected electronic devices. Devices, systems, appliances, and the like communicating and/or interoperating within the framework provided. An interoperability security model, method, and system, such as a Dart Security model, method and system provide an infrastructure for protecting the integrity of a device and its content from viral, other malicious, or accidental damage.
104 Citations
31 Claims
-
1. A method for limiting access to and or the understanding of resources or capabilities of an interoperability application package and or resources or capabilities of interoperability devices, the method comprising:
-
(1) forming a basis for security using at least a plurality of the following steps;
(a) automatically collecting an entropy state measure associated with the device;
(b) generating a key pair;
(c) generating a device Id; and
(d) storing the key pairs, device id, and the entropy state measure on the device for continued use whenever the device is active;
(2) forming rules for allowing or preventing the limiting access; and
(3) using the formed basis and formed rules to provide a security task at least for the device.
-
-
2. A method for limiting access to and or the understanding of resources or capabilities of an interoperability application package and or resources or capabilities of interoperability devices, the method comprising:
-
(1) forming a basis for security in at least one of the following steps when a device first starts operation;
(a) automatically collecting of entropy;
(b) generating a public/private key pair;
(c) generation of a unique device Id; and
(d) storing the public and private key pairs, device unique id, and the entropy state for a random number generator on the device for continued use whenever the device is active;
(2) forming rules for allowing or preventing the limiting access;
(3) use of the formed basis for one or more of the following security tasks;
(a) enforcing the rules for access to devices, applications and resources;
(b) securing the rules themselves so that they cannot be modified by an unauthorized user or agent;
(c) securing the storage of the public and private key pairs, device unique id, and the entropy state for a random number generator;
(d) securing operating parameters or data to be shared between applications and devices;
(e) securing communication channels;
(f) encrypting resources so that they can only be understood or used by a particular device or set of devices, and/or a particular application or set of applications, and/or when accessed using a shared secret; and
(g) generating universally unique ids and using them for identifying devices, applications, data formats, collections, records, individual media files, or even individual data items valid across all devices and or applications and or datasets or items for all times. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer program product for use in conjunction with a computer system or information appliance, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising:
-
a program module that directs the computer system or information appliance to function in a specified manner for limiting access to and or the understanding of resources or capabilities of an interoperability application package and or resources or capabilities of interoperability devices, the program module including instructions for;
(1) forming a basis for security using at least a plurality of the following steps;
(a) automatically collecting an entropy state measure associated with the device;
(b) generating a key pair;
(c) generating a device Id; and
(d) storing the key pairs, device id, and the entropy state measure on the device for continued use whenever the device is active;
(2) forming rules for allowing or preventing the limiting access; and
(3) using the formed basis and formed rules to provide a security task at least for the device.
-
Specification