METHODS OF DYNAMICALLY SECURING ELECTRONIC DEVICES AND OTHER COMMUNICATIONS THROUGH ENVIRONMENTAL AND SYSTEM MEASUREMENTS LEVERAGING TAILORED TRUSTWORTHY SPACES
First Claim
1. A method for securely performing a function on a device comprising a sensor and memory containing first instructions to implement at least one tailored trustworthy space rule (“
- TTS rule”
) and second instructions for performing the function, the method comprising;
prior to performing the function on the device, obtaining a first measurement from the sensor, comparing the first measurement to one or more values defined by the at least one TTS rule, and only performing the function if the first measurement matches at least one of the one or more values defined by the at least one TTS rule; and
while performing the function on the device, obtaining a second measurement from the sensor, comparing the second measurement to the one or more values defined by the at least one TTS rule, and only continuing to perform the function if the second measurement matches at least one of the one or more values defined by the at least one TTS rule.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its operating posture by allowing, limiting, or disallowing access to applications, application features, devices features, data, and other information based on the current Tailored Trustworthy Space (TTS) definitions and rules which provided for various situationally dependent scenarios. Multiple TTS may be defined for a given deployment, each of which specifies one or more sensors and algorithms for combining sensor data from the device, other connected devices, and/or other data sources from which the current TTS is identified. The device further achieves security by loading digital credentials through a unidirectional multidimensional physical representation process which allows for the device to obtain said credentials without the risk of compromising the credential issuing system through the data transfer process. This secure system methodology may be used to create a Mobile Secure Compartmentalized Information Facility (M-SCIF), among other applications.
79 Citations
23 Claims
-
1. A method for securely performing a function on a device comprising a sensor and memory containing first instructions to implement at least one tailored trustworthy space rule (“
- TTS rule”
) and second instructions for performing the function, the method comprising;prior to performing the function on the device, obtaining a first measurement from the sensor, comparing the first measurement to one or more values defined by the at least one TTS rule, and only performing the function if the first measurement matches at least one of the one or more values defined by the at least one TTS rule; and while performing the function on the device, obtaining a second measurement from the sensor, comparing the second measurement to the one or more values defined by the at least one TTS rule, and only continuing to perform the function if the second measurement matches at least one of the one or more values defined by the at least one TTS rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
- TTS rule”
-
15. A system for securing one or more devices using a tailored trustworthy space rule (“
- TTS rule”
), comprising;a device comprising a processor, a memory, and a sensor, wherein the processor is communicatively coupled to the memory and the sensor; wherein the memory contains an application and a TTS rule, and the processor is configured to load and execute the application; wherein the processor is configured to obtain a first measurement from the sensor prior to loading the application; wherein the processor is configured to perform a first check comparing the first measurement against one or more values defined by the TTS rule; and wherein, upon passing the first check, the processor is configured to proceed with loading the application. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
- TTS rule”
-
23. A non-transitory machine-readable storage medium embodying a set of instructions for securing a device using tailored trustworthy space rules (“
- TTS rules”
), wherein the device is configured to perform a first action and wherein the instructions, when executed by a processor in the device, cause the processor to perform operations, the operations comprising;obtaining a security certificate from a certificate server using an out-of-band process; encrypting and storing the security certificate in a certificate store on the device; obtaining a configuration comprising a device-wide TTS rule from a system server; obtaining application data comprising an application configured to perform a second action and an application-specific TTS rule from an application server; storing the application data in an application store on the device; prior to executing the application, comparing a first measurement from a sensor in the device to the device-wide TTS rule and the application-specific TTS rule; if the first measurement fails either the device-wide TTS rule or the application-specific TTS rule, either refraining from executing the application or preventing the application from performing the second action in accordance with the device-wide TTS rule or the application-specific TTS rule, respectively; during execution of the application, comparing a second measurement from the sensor to the device-wide TTS rule and the application-specific TTS rule; if the second measurement fails either the device-wide TTS rule or the application-specific TTS rule, either ceasing execution of the application or preventing the application from performing the second action in accordance with the device-wide TTS rule or the application-specific TTS rule, respectively; and if either the first measurement or the second measurement fails the device-wide TTS rule, preventing the device from performing the first action in accordance with the device-wide TTS rule.
- TTS rules”
Specification