Embedded self-contained security commands
First Claim
1. A method for modifying security parameters of an electronic device, the method comprising:
- receiving a first command at the electronic device, the first command comprising a data portion;
extracting from the data portion a security rights modification command set comprising at least a command for initiating a secure session at the electronic device and for closing the secure session, wherein initiating of the secure session comprises authentication, and wherein the security rights modification command set is provided for modifying security parameters of the electronic device during the secure session, some of the security parameters modifiable only during a secure session; and
automatically executing the security rights modification command set with a processor of the electronic device, absent other security rights commands being executed during execution of the security rights modification command set;
wherein the security rights modification command set comprises a command for logging into a secure session and a command for logging off the secure session; and
wherein automatically executing the security rights modification command set comprises executing the security rights modification command set to log into the secure session, to modify security rights and to log out of the secure session, the secure session occurring absent execution of intervening commands other than the commands in the security rights modification command set.
3 Assignments
0 Petitions
Accused Products
Abstract
A set of commands is provided to a system for execution in order to modify a security related aspect of the system. The system executes the set of commands absent an intervening command being executed, for example by receiving a first command comprising a data portion, extracting a security rights modification command set comprising commands for initiating a secure session and for closing the secure session, and automatically executing the security rights modification command set with a processor, absent other security rights commands being executed. Initiating the secure session may comprise authentication, and the security rights modification command set may provide for security parameters modifiable only during a secure session.
9 Citations
24 Claims
-
1. A method for modifying security parameters of an electronic device, the method comprising:
-
receiving a first command at the electronic device, the first command comprising a data portion; extracting from the data portion a security rights modification command set comprising at least a command for initiating a secure session at the electronic device and for closing the secure session, wherein initiating of the secure session comprises authentication, and wherein the security rights modification command set is provided for modifying security parameters of the electronic device during the secure session, some of the security parameters modifiable only during a secure session; and automatically executing the security rights modification command set with a processor of the electronic device, absent other security rights commands being executed during execution of the security rights modification command set; wherein the security rights modification command set comprises a command for logging into a secure session and a command for logging off the secure session; and wherein automatically executing the security rights modification command set comprises executing the security rights modification command set to log into the secure session, to modify security rights and to log out of the secure session, the secure session occurring absent execution of intervening commands other than the commands in the security rights modification command set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A device comprising:
-
a port for receiving a first command, the first command comprising a security rights modification command set for initiating a secure session at the device, for modifying security parameters of the device during the secure session, some of the security parameters modifiable only during a secure session, and for closing the secure session; and a processor for extracting the security rights modification command set from the first command, for establishing a processor environment wherein during a secure session commands other than those within the security rights modification command set are not executed, and for executing the security rights modification command set absent other security rights commands being executed during execution of the security rights modification command set; wherein the security rights modification command set comprises a command for logging into a secure session and a command for logging off the secure session; and wherein executing the security rights modification command set comprises executing the security rights modification command set to log into the secure session, to modify security rights and to log out of the secure session, the secure session occurring absent execution of intervening commands other than the commands in the security rights modification command set. - View Dependent Claims (17, 18, 24)
-
-
19. A method comprising:
-
receiving a plurality of security rights modification commands each comprising serialization data for at least one of identifying said security rights modification command and ordering said security rights modification command within the plurality of security rights modification commands; storing the security rights modification commands within a memory; receiving a first command comprising an indication of a set of security rights modification commands within the plurality of security rights modification commands; extracting the indication from the first command; and automatically executing the set of security rights modification commands in dependence of the extracted indication, the set of security rights modification commands for initiating a secure session, for modifying security parameters during the secure session, some of the security parameters for being modified only during a secure session, and, for closing the secure session absent at least one of another security rights command being executed and another secure session being initiated during the secure session. - View Dependent Claims (20, 21, 22, 23)
-
Specification