Method and Apparatus for Detecting Unauthorized Access to a Computing Device and Securely Communicating Information about such Unauthorized Access
First Claim
Patent Images
1. A method of detecting attacks on a computing device and securely communicating information about such attacks, comprising:
- a. detecting an attack on the computing device;
b. determining the type of attack;
c. forming a response key based on the type of attack detected and the identity of the computing device;
d. accepting a request from a requesting entity;
e. combining at least a portion of the request with at least a portion of the response key to form a transformed key; and
f. providing the transformed key to the requesting entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for detecting attacks against a computing device are described. Such attacks may be detected by the device and reported to a requesting entity in a manner that makes it difficult for an attacker to know that the attack has been detected. Several exemplary embodiments comprising different client/server and client/network type systems are presented.
-
Citations
25 Claims
-
1. A method of detecting attacks on a computing device and securely communicating information about such attacks, comprising:
-
a. detecting an attack on the computing device; b. determining the type of attack; c. forming a response key based on the type of attack detected and the identity of the computing device; d. accepting a request from a requesting entity; e. combining at least a portion of the request with at least a portion of the response key to form a transformed key; and f. providing the transformed key to the requesting entity. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing device configured to detect and securely report information concerning attacks against the computing device, comprising:
-
a. a storage element configured to store a programmed hardware key; b. an attack detection circuit adapted to detect attacks against the computing device; c. a key formation circuit adapted to form a response key based on the Programmed hardware key and an input from the attack detection circuit; d. an interface circuit adapted to receive a request from a requesting entity; e. a transformation circuit adapted to generate a transformed key from at least a portion of the response key and at least a portion of the request received at the interface circuit; and f. a circuit adapted to provide the transformed key to the requesting entity. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computing device configured to detect and securely report information concerning attacks against the computing device, comprising:
-
a. storage means configured to store a programmed hardware key; b. attack detection means adapted to detect attacks against the computing device; c. a key formation means adapted to form a response key based on the programmed hardware key and an input from the attack detection means; d. an interface means adapted to receive a request from a requesting entity; e. a transformation means adapted to generate a transformed key from at least a portion of the response key and at least a portion of the request received at the interface means; and f. a transmission means adapted to provide the transformed key to the requesting entity.
-
-
17. A method of securely receiving information about attacks on computing device at a requesting entity, comprising:
-
a. forming a request at the requesting entity; b. providing the request to the computing device; c. receiving a response from the computing device based on at least a portion of the request, the identity of the computing device and any attack detected; and d. determining from the response the identity of the computing device and the type of any attack detected. - View Dependent Claims (18, 19)
-
-
20. A requesting entity adapted to securely receive information about attacks on a computing device, comprising:
-
a. a request formation circuit adapted to form a request; b. a circuit adapted to provide the request to the computing device; c. a receiver circuit adapted to receive from the computing device a response based on at least a portion of the request, the identity of the computing device and any attack detected; and d. a comparison circuit adapted to compare the response from the computing device to a plurality of expected responses and determine the identity of the computing device and the type of any attack detected. - View Dependent Claims (21, 22)
-
-
23. A requesting entity adapted to securely receive information about attacks on a computing device, comprising:
-
a. means for forming a request; b. means for providing the request to the computing device; c. means for receiving from the computing device a response based on at least a portion of the request, the identity of the computing device and any attack detected; and d. means for comparing the response from the computing device to a plurality of expected responses and determining the identity of the computing device and the type of any attack detected. - View Dependent Claims (24, 25)
-
Specification