Trusted sensors
First Claim
Patent Images
1. A computer-implemented sensor method executed by a processor comprising:
- receiving sensor readings from sensors of a device, the device including a trust component that provides trust information which is applied to the sensor readings to create trustworthy readings for communication to a consuming application;
when the trust component includes a virtualization component that virtualizes the sensors and facilitates interaction with the sensors by the consuming application;
signing the sensor readings with the trust information via a virtual machine within the device; and
independent of software configuration of the device, when the trust component includes a central hardware trust module that comprises a secure counter;
obtaining a counter value from the secure counter;
signing the sensor readings and the obtained counter value at the sensors using the trust information; and
registering the device and the sensors with a remote service to associate the sensors with the device after signing the sensor readings and the obtained counter value.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that provides trusted sensors and trusted sensor readings on computing devices such as mobile devices. The architecture utilizes a trustworthy computing technology (e.g., trusted platform module (TPM). In the context of TPM, one implementation requires no additional hardware beyond the TPM and a virtualized environment to provide trusted sensor readings. A second implementation incorporates trusted computing primitives directly into sensors and enhances security using signed sensor readings. Privacy issues arising from the deployment of trusted sensors are also addressed by utilizing protocols.
124 Citations
20 Claims
-
1. A computer-implemented sensor method executed by a processor comprising:
-
receiving sensor readings from sensors of a device, the device including a trust component that provides trust information which is applied to the sensor readings to create trustworthy readings for communication to a consuming application; when the trust component includes a virtualization component that virtualizes the sensors and facilitates interaction with the sensors by the consuming application; signing the sensor readings with the trust information via a virtual machine within the device; and independent of software configuration of the device, when the trust component includes a central hardware trust module that comprises a secure counter; obtaining a counter value from the secure counter; signing the sensor readings and the obtained counter value at the sensors using the trust information; and registering the device and the sensors with a remote service to associate the sensors with the device after signing the sensor readings and the obtained counter value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device comprising:
-
a processor; and executable instructions operable by the processor, the executable instructions comprising a sensor method, the sensor method comprising; receiving sensor readings from sensors of the device, the device including a trust component that provides trust information which is applied to the sensor readings to create trustworthy readings for communication to a consuming application; when the trust component includes a virtualization component that virtualizes the sensors and facilitates interaction with the sensors by the consuming application; signing the sensor readings with the trust information via a virtual machine within the device; and independent of software configuration of the device, when the trust component includes a hardware trust module that comprises a secure counter; obtaining a counter value from the secure counter; signing the sensor readings and the obtained counter value at the sensors using the trust information; and registering the device and the sensors with a remote service to associate the sensors with the device after signing the sensor readings and the obtained counter value. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A storage device for storing computer readable instructions, the computer readable instructions when executed by a processing device performs a sensor method, the sensor method comprising:
-
receiving sensor readings from sensors of a mobile device, the mobile device including a trust component that provides trust information which is applied to the sensor readings to create trustworthy readings for communication to a consuming application; when the trust component includes a virtualization component that virtualizes the sensors and facilitates interaction with the sensors by the consuming application; signing the sensor readings with the trust information via a virtual machine within the mobile device; and independent of software configuration of the mobile device, when the trust component includes a central hardware trust module that comprises a secure counter; obtaining a counter value from the secure counter; signing the sensor readings and the obtained counter value at the sensors using the trust information; and registering the mobile device and the sensors with a remote service to associate the sensors with the mobile device after signing the sensor readings and the obtained counter value. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification