Embedded Self-Contained Security Commands
First Claim
Patent Images
1. A method comprising:
- receiving a first command, the first command comprising a data portion;
extracting from the data portion a security rights modification command set comprising at least a command for initiating a secure session and for closing the secure session, initiating of the secure session comprising authentication, the security rights modification command set for modifying security parameters during the secure session, some of the security parameters for being modified only during a secure session; and
,automatically executing with a processor the security rights modification command set, absent other security rights commands being executed during execution of the security Tights modification command set.
3 Assignments
0 Petitions
Accused Products
Abstract
A set of commands is provided to a system for execution in order to modify a security related aspect of the system. The system executes the set of commands absent an intervening command being executed.
22 Citations
24 Claims
-
1. A method comprising:
-
receiving a first command, the first command comprising a data portion; extracting from the data portion a security rights modification command set comprising at least a command for initiating a secure session and for closing the secure session, initiating of the secure session comprising authentication, the security rights modification command set for modifying security parameters during the secure session, some of the security parameters for being modified only during a secure session; and
,automatically executing with a processor the security rights modification command set, absent other security rights commands being executed during execution of the security Tights modification command set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A device comprising:
-
a port for receiving a first command, the first command comprising a security rights modification command set for initiating a secure session, for modifying security parameters during the secure session, some of the security parameters for being modified only during a secure session, and for closing the secure session; and
,a processor for extracting the security rights modification command set from the first command, for establishing a processor environment wherein during a secure session commands other than those within the security rights modification command set are other than executable, and for executing the security rights modification command set absent other security rights commands being executed during execution of the security rights modification command set. - View Dependent Claims (18, 19)
-
-
20. A method comprising:
-
receiving a plurality of security rights modification commands each comprising serialization data for at least one of identifying said security rights modification command and ordering said security rights modification command within the plurality of security rights modification commands; storing the security rights modification commands within a memory; receiving a first command comprising an indication of a set of security rights modification commands within the plurality of security rights modification commands; extracting the indication from the first command; and automatically executing the set of security rights modification commands in dependence of the extracted indication, the set of security rights modification commands for initiating a secure session, for modifying security parameters during the secure session, some of the security parameters for being modified only during a secure session, and, for closing the secure session absent at least one of another security rights command being executed and another secure session being initiated during the secure session. - View Dependent Claims (21, 22, 23, 24)
-
Specification