PROTECTED PORT FOR ELECTRONIC ACCESS TO AN EMBEDDED DEVICE
First Claim
1. A method for controlling access by a user to an embedded device comprising:
- detecting an authorization request from a user device to be granted access to the embedded device at a requested protection level;
issuing a challenge phrase and a device identifier to the user device in response to the authorization request;
verifying the user device'"'"'s response to the challenge phrase; and
granting the user device access to the embedded device at the requested protection level if authorization of the user device'"'"'s response is successful.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for controlling access by a user to an embedded device. A protected access port, integral with the embedded device, includes an access manager and a level controller. The access manager issues a challenge phrase using a public key of the embedded device in response to a request by a user device to access the embedded device and determines the veracity of the user'"'"'s response to the challenge phrase. A secure server stores a private key corresponding to the public encryption key of the embedded device and is operable to authenticate the user credentials and issues the response to the challenge phrase dependent upon the private key of the embedded device.
101 Citations
23 Claims
-
1. A method for controlling access by a user to an embedded device comprising:
-
detecting an authorization request from a user device to be granted access to the embedded device at a requested protection level;
issuing a challenge phrase and a device identifier to the user device in response to the authorization request;
verifying the user device'"'"'s response to the challenge phrase; and
granting the user device access to the embedded device at the requested protection level if authorization of the user device'"'"'s response is successful. - View Dependent Claims (2, 3, 4)
-
-
5. A method for a user device to access an embedded device comprising:
-
issuing an authorization request to the embedded device to be authorized to access at a requested protection level;
receiving a challenge phrase and a device identifier from the embedded device;
passing the challenge phrase, the device identifier and credentials of the user device to a secure server;
receiving a response from the secure server; and
passing the response to the embedded device for verification. - View Dependent Claims (6, 7, 8)
-
-
9. A protected port for controlling access by a user device to an embedded device, the protected port comprising:
-
a port controller operable to interface with the user device;
an access manager operable to determine if the user device is authorized for access at a requested protection level;
an access port; and
a level controller responsive to the access manager and operable to control a protection level of the access port, wherein the access port is supported by an architecture specific hardware and provides limitation of access to the embedded device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for controlling access by a user device to an embedded device, the system comprising:
-
a protected access port integral with the embedded device and comprising a access manager operable to issue a challenge phrase in response to a request sequence from the user device to access the embedded device and further operable to determine the veracity of a response by the user device to the challenge phrase;
a secure server operable to store a private key of the embedded device corresponding to the public key of the embedded device; and
port access equipment operable by the user device to pass the challenge phrase and user credentials to the secure connection with the secure server;
wherein the secure server is further operable to authenticate the user credentials and issue the response to the challenge phrase dependent upon the private key of the embedded device, and wherein the challenge phrase comprises a cipher of the random number combined with the request sequence. - View Dependent Claims (18)
-
-
19. An apparatus for controlling access by a user to an embedded device via a protected port comprising:
-
a challenge means for issuing a challenge phrase to a user device;
a authorization means for verifying a response by the user device to the challenge phrase to determine if the user is authorized for access at a requested protection level; and
a level control means, responsive to the verification means, for selecting an access mode of the protected port. - View Dependent Claims (20, 21, 22, 23)
-
Specification