Wireless detection and/or containment of compromised electronic devices in multiple power states
First Claim
Patent Images
1. A method comprising:
- determining a security status of an electronic device; and
transmitting the security status to an external device using a transmitter configured to operate according to a power-scavenging protocol.
1 Assignment
0 Petitions
Accused Products
Abstract
Architectures and techniques that allow an electronic platform having a Radio Frequency Identification (RFID) tag to transmit platform security status information regardless of the power state of the platform. The RFID tag contains both an external passive RF interface as well as an internal bus interface that may allow components of the host platform to communicate with the RFID tag. The embedded processing agent may provide the ability to detect that a system has come under attack and cause suspicious traffic to be blocked.
-
Citations
38 Claims
-
1. A method comprising:
-
determining a security status of an electronic device; and
transmitting the security status to an external device using a transmitter configured to operate according to a power-scavenging protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
one or more components interconnected to provide functionality to an electronic device, wherein at least one of the components is configured to detect and report a security violation within the electronic device;
a network interface coupled with at least one of the components to provide access to remote network devices;
a embedded processing agent coupled with one or more of the components to receive the report of the security violation; and
a transmitter coupled with the embedded processing agent to transmit information corresponding to the security violation using a power-scavenging wireless communication protocol. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
one or more components interconnected to provide functionality to an electronic device, wherein at least one of the components is configured to detect and report a security violation within the electronic device;
a network interface coupled with at least one of the components to provide access to remote network devices;
an Ethernet cable coupled with the network interface;
a embedded processing agent coupled with one or more of the components to receive the report of the security violation; and
a transmitter coupled with the embedded processing agent to transmit information corresponding to the security violation using a power-scavenging wireless communication protocol. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. An article comprising a computer-readable medium having stored thereon instructions that, when executed, cause one or more processors to:
-
determine a security status of an electronic device; and
transmit the security status to an external device using a transmitter configured to operate according to a power-scavenging protocol. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification