METHOD AND APPARATUS FOR DETECTION OF TAMPERING ATTACKS
First Claim
Patent Images
1. A method for detecting an attempted attack on a security system comprising:
- retrieving a parameter from a hardware system, wherein the parameter changes during an operation of the hardware system;
comparing the retrieved parameter with a previously stored parameter; and
, detecting a lack of change between the retrieved parameter and the previously stored parameter.
10 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting an attempted attack on a security system. In one preferred embodiment of the present invention, the method includes the step of retrieving a parameter from a hardware system, wherein the parameter changes during an operation of the hardware system. Then, comparing the retrieved parameter with a previously stored parameter; and, detecting a lack of change between the retrieved parameter and the previously stored parameter. An apparatus and an article of manufacture for detecting an attempted attack on a security system is also disclosed.
-
Citations
24 Claims
-
1. A method for detecting an attempted attack on a security system comprising:
-
retrieving a parameter from a hardware system, wherein the parameter changes during an operation of the hardware system;
comparing the retrieved parameter with a previously stored parameter; and
, detecting a lack of change between the retrieved parameter and the previously stored parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for detecting a tampering attempt in a security system comprising:
-
a processor;
a memory coupled to the processor, the memory configured to cause the processor to execute a method comprising;
retrieving a parameter from a hardware system, wherein the parameter changes during an operation of the hardware system;
comparing the retrieved parameter with a previously stored parameter; and
,detecting a lack of change between the retrieved parameter and the previously stored parameter. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An article of manufacture comprising a computer-readable medium having instructions stored thereon for causing a processor to perform a method for detecting an attempted attack on a security system, the method comprising:
-
retrieving a parameter from a hardware system, wherein the parameter changes during an operation of the hardware system;
comparing the retrieved parameter with a previously stored parameter; and
,detecting a lack of change between the retrieved parameter and the previously stored parameter. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification