Limited Functionality Mode for Secure, Remote, Decoupled Computer Ownership
First Claim
1. A computer system comprising:
- one or more components; and
a secure computing environment coupled to the components and configured to program at least one of the components to enter a limited functionality mode responsive to expiration of a use right to the computer system, wherein operation of the computer system in the limited functionality mode is reduced compared to operation when the use right has not expired, and wherein the secure computing environment is configured to monitor the components in the limited functionality mode to detect that a limited functionality mode configuration has been modified by an unauthorized entity, and wherein the secure computing environment is configured to cause the computer system to enter a second mode in which operation of the computer system is reduced compared to operation in the limited functionality mode in response to detecting that the limited functionality mode configuration has been modified.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a computer system comprises one or more components and a secure computing environment coupled to the components. The secure computing environment is configured to program at least one of the components to enter a limited functionality mode responsive to expiration of a use right to the computer system, wherein operation of the computer system in the limited functionality mode is reduced compared to operation when the use right has not expired. The secure computing environment is configured to monitor the components in the limited functionality mode to detect that a limited functionality mode configuration has been modified by an unauthorized entity and to cause the computer system to enter a second mode in which operation of the computer system is reduced compared to operation in the limited functionality mode in response. In another embodiment, the secure computing environment detects a non-temporal event that indicates a violation of an owner-imposed restriction and enters a limited functionality mode.
36 Citations
19 Claims
-
1. A computer system comprising:
-
one or more components; and a secure computing environment coupled to the components and configured to program at least one of the components to enter a limited functionality mode responsive to expiration of a use right to the computer system, wherein operation of the computer system in the limited functionality mode is reduced compared to operation when the use right has not expired, and wherein the secure computing environment is configured to monitor the components in the limited functionality mode to detect that a limited functionality mode configuration has been modified by an unauthorized entity, and wherein the secure computing environment is configured to cause the computer system to enter a second mode in which operation of the computer system is reduced compared to operation in the limited functionality mode in response to detecting that the limited functionality mode configuration has been modified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
programming at least one of one or more components in a computer system to enter a limited functionality mode responsive to expiration of a use right to the computer system, wherein operation of the computer system in the limited functionality mode is reduced compared to operation when the use right has not expired; monitoring the components in the limited functionality mode to detect that a limited functionality mode configuration has been modified by an unauthorized entity; and entering a second mode in which operation of the computer system is reduced compared to operation in the limited functionality mode in response to detecting that the limited functionality mode configuration has been modified. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer system comprising:
-
one or more components; and a secure computing environment coupled to the components and configured to detect a non-temporal event that indicates a violation of a restriction imposed by an owner of the computer system, and wherein the secure computing environment is configured to program at least one of the components to enter a limited functionality mode responsive to detecting the event, wherein operation of the computer system in the limited functionality mode is reduced compared to operation in a normal mode. - View Dependent Claims (19)
-
Specification