Context aware security
First Claim
1. A method for performing layered semantic security between a near communication device and a far communication device, comprising:
- collecting first changing contextual information regarding the near communication device;
characterizing a first security vulnerability based upon the first changing contextual information;
collecting second changing contextual information for a plurality of communication links between the near communication device and the far communication device, wherein the plurality of communication links include a near communication link between the near communication device and a near network interface;
characterizing a second security vulnerability based on the second changing contextual information;
selecting a cryptographic protocol based upon the first and second security vulnerability characterizations; and
the near communication device establishing a secure communication with the far communication device by employing the selected cryptographic protocol in at least one communication link of the plurality of communication links.
1 Assignment
0 Petitions
Accused Products
Abstract
Layered semantic security provides a high degree of security for a mobile device based upon contextual awareness that dynamically changes based upon interaction between a user and a near communication device, which in turn interacts with a network, which ultimately interacts to a far communication device. Generating a shared secret key with a master secret and changing contextual information based on context awareness provides immunity to chosen plain text attacks by providing semantic security at each layer. Thereby, relying upon the overall robustness of the layering of semantic security, processing and power resources consumed can be advantageously adjusted dynamically to enhance concurrent use and service life of a mobile communication device.
-
Citations
42 Claims
-
1. A method for performing layered semantic security between a near communication device and a far communication device, comprising:
-
collecting first changing contextual information regarding the near communication device; characterizing a first security vulnerability based upon the first changing contextual information; collecting second changing contextual information for a plurality of communication links between the near communication device and the far communication device, wherein the plurality of communication links include a near communication link between the near communication device and a near network interface; characterizing a second security vulnerability based on the second changing contextual information; selecting a cryptographic protocol based upon the first and second security vulnerability characterizations; and the near communication device establishing a secure communication with the far communication device by employing the selected cryptographic protocol in at least one communication link of the plurality of communication links. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. At least one processor for performing layered semantic security, comprising:
-
a first module configured to collect first changing contextual information regarding a near communication device; a second module configured to characterize a first security vulnerability based upon the first changing contextual information; a third module configured to collect second changing contextual information for a plurality of communication links between the near communication device and a far communication device, wherein the plurality of communication links include a near communication link between the near communication device and a near network interface; a fourth module configured to characterize a second security vulnerability based on the second changing contextual information; a fifth module configured to select a cryptographic protocol based upon the first and second security vulnerability characterizations; and a sixth module of the near communication device configured to establish a secure communication with the far communication device by employing the selected cryptographic protocol in at least one communication link of the plurality of communication links. - View Dependent Claims (20, 21)
-
-
22. A computer program product, comprising:
a non-transitory computer readable medium, comprising; a first set of codes for causing a computer to collect first changing contextual information regarding a near communication device; a second set of codes for causing the computer to characterize a first security vulnerability based upon the first changing contextual information; a third set of codes for causing a computer to collect second changing contextual information for a plurality of communication links between the near communication device and a far communication device, wherein the plurality of communication links include a near communication link between the near communication device and a near network interface; a fourth set of codes for causing the computer to characterize a second security vulnerability based on the second changing contextual information; a fifth set of codes for causing the computer to select a cryptographic protocol based upon the first and second security vulnerability characterizations; and a sixth set of codes for causing the computer to establish a secure communication with the far communication device employing the selected cryptographic protocol in at least one communication link of the plurality of communication links. - View Dependent Claims (23, 24)
-
25. An apparatus for performing layered semantic security between a near communication device and a far communication device, comprising:
-
means for collecting first changing contextual information regarding the near communication device; means for characterizing a first security vulnerability based upon the first changing contextual information; means for collecting second changing contextual information for a plurality of communication links between the near communication device and the far communication device, wherein the plurality of communication links include a near communication link between the near communication device and a near network interface; means for characterizing a second security vulnerability based on the second changing contextual information; means for selecting a cryptographic protocol based upon the first and second security vulnerability characterizations; and means for establishing a secure communication with the far communication device by employing the selected cryptographic protocol in at least one communication link of the plurality of communication links. - View Dependent Claims (26, 27)
-
-
28. An apparatus for establishing layered semantic security between a near communication device and a far communication device, comprising:
-
a memory configured to collect first changing contextual information regarding the near communication device, and to collect second changing contextual information for a plurality of communication links between the near communication device and the far communication device, wherein the plurality of communication links include a near communication link between the near communication device and a near network interface; a context awareness component configured to characterize a first security vulnerability based upon the first changing contextual information, to characterize a second security vulnerability based on the second changing contextual information, and to select a cryptographic protocol based upon the first and second security vulnerability characterizations; and a communication component, of the near communication device, configured to establish a secure communication with the far communication device by employing the selected cryptographic protocol in at least one communication link of the plurality of communication links. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification