Enhancing Security of Sensor Data for a System Via an Embedded Controller
First Claim
1. A system, comprising:
- a host processor and memory, wherein the memory stores an operating system;
an embedded controller coupled to the host processor, wherein the embedded controller comprises a memory medium;
a sensor unit coupled with the embedded controller to feed sensor data for a user from at least one sensor;
wherein the memory medium stores program instructions executable to;
receive the sensor data from the sensor unit;
encrypt and/or digitally sign the sensor data, thereby generating protected sensor data; and
send the protected sensor data to the operating system or another process coupled to the computer system;
wherein the protected sensor data are useable for secure login by the user.
7 Assignments
0 Petitions
Accused Products
Abstract
System and method for securing sensor data in a computer system that includes a host processor and memory that stores an operating system, and an embedded controller coupled to the host processor. The embedded processor receives sensor data for a user from at least one sensor, and encrypts and/or digitally signs the sensor data, thereby generating protected sensor data, or performs pattern recognition on the sensor data, thereby generating user identification data. The embedded processor then sends the protected sensor data or the user identification data to the operating system or another process coupled to the computer system. The protected sensor data or the user identification data are used for secure transmission of the sensor data.
49 Citations
20 Claims
-
1. A system, comprising:
-
a host processor and memory, wherein the memory stores an operating system; an embedded controller coupled to the host processor, wherein the embedded controller comprises a memory medium; a sensor unit coupled with the embedded controller to feed sensor data for a user from at least one sensor; wherein the memory medium stores program instructions executable to; receive the sensor data from the sensor unit; encrypt and/or digitally sign the sensor data, thereby generating protected sensor data; and send the protected sensor data to the operating system or another process coupled to the computer system; wherein the protected sensor data are useable for secure login by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a host processor and memory, wherein the memory stores an operating system; an embedded controller coupled to the host processor, wherein the embedded controller comprises a memory medium; a sensor unit coupled with the embedded controller to feed sensor data for a user from at least one sensor; wherein the memory medium stores program instructions executable to; receive the sensor data from the sensor unit; perform one or more of; encrypt and/or digitally sign the sensor data, thereby generating protected sensor data;
orperform pattern recognition on the sensor data, thereby generating digitally signed user identification data; and send the protected sensor data or the digitally signed user identification data to the operating system or another process coupled to the computer system; wherein the protected sensor data or the digitally signed user identification data are useable for secure login by the user.
-
-
13. A method for secure login using a computer system that includes a host processor and memory, and an embedded controller coupled to the host processor, the method comprising:
-
receiving, by the embedded processor, sensor data for a user from at least one sensor; encrypting and/or digitally signing the sensor data, thereby generating protected sensor data, or performing pattern recognition on the sensor data, thereby generating digitally signed user identification data; and sending the protected sensor data or the digitally signed user identification data to the operating system or another process coupled to the computer system; wherein the protected sensor data or the digitally signed user identification data are useable for secure login by the user. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification