External Reference Monitor
First Claim
1. A method for increasing security of an untrusted device, the method comprising:
- sending a request to the untrusted device, the request indicating one or more challenges to be performed by a secure application executing on the untrusted device;
determining an expected response to the one or more challenges, wherein the expected response is determined at a secure hardware component based on an expected configuration of the untrusted device;
receiving a response to the request from the untrusted device;
determining a security status of the untrusted device based on the expected response and the received response; and
allowing the untrusted device to perform one or more functions based on determining that the security status of the untrusted device is a secure status.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for increasing the security or trust associated with an untrusted device are provided. For example, a trusted hardware component may send a request to the untrusted device. The request may indicate one or more challenges to be performed by a secure application executing on the untrusted device. The trusted hardware component may determine an expected response to the one or more challenges. The expected response may be determined at the secure hardware component based on an expected configuration of the untrusted device. The trusted hardware component may receive a response to the request from the untrusted device. The trusted hardware component may determine a security status of the untrusted device based on the expected response and the received response
-
Citations
21 Claims
-
1. A method for increasing security of an untrusted device, the method comprising:
-
sending a request to the untrusted device, the request indicating one or more challenges to be performed by a secure application executing on the untrusted device; determining an expected response to the one or more challenges, wherein the expected response is determined at a secure hardware component based on an expected configuration of the untrusted device; receiving a response to the request from the untrusted device; determining a security status of the untrusted device based on the expected response and the received response; and allowing the untrusted device to perform one or more functions based on determining that the security status of the untrusted device is a secure status. - View Dependent Claims (2, 3, 4)
-
-
5. A trusted hardware module for providing security for an untrusted device, the trusted hardware module comprising:
-
a communication interface configured to communicate with the untrusted device using a local communication protocol; and a processor configured to; determine one or more challenges to be performed by the untrusted device, wherein the one or more challenges comprise an input parameter generated by the trusted hardware module, determine an expected response to the one or more challenges, wherein the expected response is determined based on an expected configuration of the untrusted device and the input parameter, and determine a security status of the untrusted device based on the expected response and a response received from the untrusted device. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A method for a communication device to perform a secure call using untrusted hardware, the method comprising:
-
receiving a request to perform a secure call; authenticating with a trusted hardware component; sending an indication of the contents of a memory region corresponding to at least a portion of an unsuspended process executing on the communication device to the trusted hardware component; and cryptographically communicating with a communication peer using the trusted hardware component. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A secure hardware component comprising:
-
a secure input configured to receive an input; a processor configured to; determine that the input was received from a trusted source based on authenticating the source of the input using the input, perform one or more security tests on an untrusted device that is associated with the source of the input, and determine the security status of the untrusted device based on a response received from the untrusted device during the one or more security tests; and a secure output configured to display an indication of the security status. - View Dependent Claims (19, 20, 21)
-
Specification