×

Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces

  • US 9,721,111 B2
  • Filed: 10/24/2014
  • Issued: 08/01/2017
  • Est. Priority Date: 10/24/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for securely and automatically performing functions on an authenticated device comprising a sensor and memory containing third instructions to implement at least one tailored trustworthy space rule (“

  • TTS rule”

    ), first instructions for performing a first function on the authenticated device, and second instructions for performing a second function on the authenticated device, wherein the authenticated device is in an unlocked state, the method comprising;

    automatically obtaining a first measurement from the sensor;

    prior to performing the first function on the authenticated device, determining that the first measurement satisfies one or more values defined by the at least one TTS rule, and performing the first function by the authenticated device;

    prior to performing the second function on the authenticated device, determining that the first measurement fails to satisfy one or more values defined by the at least one TTS rule, and blocking the authenticated device from performing the second function while maintaining the authenticated device in the unlocked state; and

    while performing the first function on the authenticated device, automatically obtaining a second measurement from the sensor, comparing the second measurement to the one or more values defined by the at least one TTS rule, and only continuing to perform the first function if the second measurement satisfies at least one of the one or more values defined by the at least one TTS rule;

    executing, by the authenticated device, the at least one TTS rule;

    when a first TTS rule of the at least one TTS rule fails to be satisfied by the first measurement and the second measurement, then automatically unloading application executable code, and deleting application executable code, application configuration, and decrypted application data from the authenticated device; and

    when a second TTS rule of the at least one TTS rule fails to be satisfied by the first measurement and the second measurement, then automatically unloading a decryption key for application data from the authenticated device and preventing application access to the decrypted application data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×