Master-Slave Protocol for Security Devices
First Claim
Patent Images
1. A method of managing a master-slave relationship between security devices in an electronic device comprising:
- disposing a master device in the electronic device;
disposing a plurality of slave devices, each of the slave devices in independent communication with the master device and each of the slave devices operable to disable a respective functional element of the electronic device;
sending a message from the master device to each of the slave devices at an interval;
determining when a reply message from each of the slave devices, responsive to the message, is timely and correct; and
sending a shutdown message that instructs each slave device to disable its respective functional element when a threshold of reply messages from the slave devices are one of untimely and incorrect.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer or electronic device uses a dedicated communication protocol for configuring, managing, and end-of-life operation of a master device controlling a plurality of security devices. The protocol includes messages for binding each security device to the master, for installing cryptographic keys, periodic heartbeat signals, as well as shutdown and disable-security messages.
47 Citations
20 Claims
-
1. A method of managing a master-slave relationship between security devices in an electronic device comprising:
-
disposing a master device in the electronic device; disposing a plurality of slave devices, each of the slave devices in independent communication with the master device and each of the slave devices operable to disable a respective functional element of the electronic device; sending a message from the master device to each of the slave devices at an interval; determining when a reply message from each of the slave devices, responsive to the message, is timely and correct; and sending a shutdown message that instructs each slave device to disable its respective functional element when a threshold of reply messages from the slave devices are one of untimely and incorrect. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-readable medium having computer-executable instructions for executing a method on a master device for securing an electronic device having at least one master device and a plurality of slave devices, the master device having a manufacturing transport key, the method comprising:
-
installing a master key responsive to a signal authenticated with the manufacturing transport key; issuing a slave-detect message; receiving a slave-detect response message from each of the plurality of slave devices; developing a unique derived key for each of the plurality of slave devices; installing the unique derived key in each of the plurality of slave devices using a separate key-establish message for each of the plurality of slave devices, the separate key establish message containing the respective unique derived key for each of the plurality of slave devices; receiving a key-establish acknowledgement message from each of the plurality of slave devices; and sending a message periodically to each of the plurality of slave devices, the message cryptographically authenticated and part of a protocol for detecting and sanctioning tampering in the electronic device. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer-readable medium having computer-executable instructions for executing a method on a slave device for securing an electronic device having at least one master device and a plurality of slave devices, the method comprising:
-
receiving a key from the master device for use in authenticating communication with the master device; receiving a periodic message from the master device for use in determining health of the system; disabling a functional element of the electronic device after receiving an authenticated shutdown message from the master device. - View Dependent Claims (20)
-
Specification