Method and system for embedded, automated, component-level control of computer systems and other complex systems
First Claim
1. A system for securing an automotive system, the system comprising:
- an automotive system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for protecting and controlling personal computers (“PCs”), components installed in or attached to PCs, and other electronic, mechanical, and electromechanical devices and systems. An exemplary embodiment of the system includes a server running on a remote computer and hardware-implemented agents embedded within the circuitry that controls the various devices within a PC. The agents intercept all communications to and from the devices into which they are embedded, passing the communications when authorized to do so, and blocking communications when not authorized, effectively disabling the devices. Embedded agents are continuously authorized from the remote server computer by handshake operations implemented as communications messages.
59 Citations
29 Claims
-
1. A system for securing an automotive system, the system comprising:
-
an automotive system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device. - View Dependent Claims (2)
-
-
3. A system for securing an aircraft system, the system comprising:
-
an aircraft including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device. - View Dependent Claims (4, 8, 18, 26)
-
-
5. A system for securing a banking system, the system comprising:
-
a banking system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device. - View Dependent Claims (6)
-
-
7. A system for securing a building system, the system comprising:
-
a building including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
-
-
9. A system for securing a computer-related system, the system comprising:
-
a computer-related system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device. - View Dependent Claims (10)
-
-
11. A system for securing a consumer electronics device, the system comprising:
-
a consumer electronics device including a subcomponent;
an agent embedded in the subcomponent that, when authorized, enables operation of the subcomponent and that, when not authorized, disables operation of the subcomponent; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the subcomponent. - View Dependent Claims (12, 14, 16, 20)
-
-
13. A system for securing a weapons system, the system comprising:
-
a weapons system, including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
-
-
15. A system for securing an energy system, the system comprising:
-
an energy system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
-
-
17. A system for securing an entertainment-related system, the system comprising:
-
an entertainment-related system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
-
-
19. A system for securing a manufacturing system, the system comprising:
-
a manufacturing system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
-
-
21. A system for securing a marine system, the system comprising:
-
a marine system including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device. - View Dependent Claims (22, 24, 28)
-
-
23. A system for securing medical equipment, the system comprising:
-
medical equipment including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
-
-
25. A system for securing a personal identification device, the system comprising:
-
a personal identification device including a subcomponent;
an agent embedded in the subcomponent that, when authorized, enables operation of the subcomponent and that, when not authorized, disables operation of the subcomponent; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the subcomponent.
-
-
27. A system for securing a security device, the system comprising:
-
a security device including a subcomponent;
an agent embedded in the subcomponent that, when authorized, enables operation of the subcomponent and that, when not authorized, disables operation of the subcomponent; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the subcomponent.
-
-
29. A system for securing a telecommunications network, the system comprising:
-
a telecommunications network including a device;
an agent embedded in the device that, when authorized, enables operation of the device and that, when not authorized, disables operation of the device; and
a server coupled to the embedded agent that, by exchanging a number of messages with the embedded agent that together compose a handshake operation, authorizes the embedded agent to enable operation of the device.
-
Specification