Master-Slave Security Devices
First Claim
1. A device for use in enforcing security in a system comprising:
- a processor, that at least in part, determines when an event has occurred;
a port coupled to the processor for communication with a master device;
a cryptographic function coupled to the processor for authenticating communications with the master device; and
a switch coupled to the processor that renders inoperable a corollary device coupled to the device, the switch responsive to a signal from the processor related to the event.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in communication with a plurality of slave security devices, known as security beans. Each security bean may be given a cryptographic key or keys for use in authenticating communication with the master security device. Each security bean may be coupled to an associated component and may have the ability to disable that associated component. In one embodiment, security bean has an analog switch that may be configured to block or attenuate a critical signal used by the associated component. The security bean may start up in the disable mode and respond to a verified signal from the master security device to enable its corresponding component.
47 Citations
20 Claims
-
1. A device for use in enforcing security in a system comprising:
-
a processor, that at least in part, determines when an event has occurred; a port coupled to the processor for communication with a master device; a cryptographic function coupled to the processor for authenticating communications with the master device; and a switch coupled to the processor that renders inoperable a corollary device coupled to the device, the switch responsive to a signal from the processor related to the event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of binding of components in a system comprising:
-
disposing a plurality of slave devices in the system, each slave device capable of rendering inoperable a respective component of the system; and determining at the slave device when an event has occurred and disabling the respective component of the system responsive to the event. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system for securing an electronic device having a plurality of components comprising:
-
one or more security devices, each of the one or more security devices associated with a corresponding one of the plurality of components, each of the one or more security devices capable of disabling its respective component, and a security master in communication with each of the one or more communication devices, wherein each of the one or more security devices disables its respective one of the plurality of components when communication between the security component and the one or more security devices fails to reach an acceptable threshold. - View Dependent Claims (18, 19, 20)
-
Specification