SYSTEM AND METHOD FOR IMPROVED SECURITY FOR A PROCESSOR IN A PORTABLE COMPUTING DEVICE (PCD)
First Claim
1. A method for improved security for a core on a system-on-a-chip (SoC) in a portable computing device (PCD), the method comprising:
- initializing a monitor module on the SoC;
sending a request from the monitor module of the SoC to the core of the SoC;
receiving at the monitor module a response from the core;
checking a timer in communication with the monitor module; and
resetting the timer with the monitor module if the response from the core is received at the monitor module before the expiration of the timer, orapplying with the monitor module at least one security measure to the core as a result of the timer expiring.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for improved security for a core in a portable computing device (PCD), such as a core operating a high level operating system (HLOS) are presented. In operation, a monitor module on the SoC is initialized. The monitor module sends a request to the core of the SoC and the monitor module receives a response from the core. A timer in communication with the monitor module is checked. The timer is reset or disabled by the monitor module if the response from the core is received at the monitor module before the expiration of the timer. Otherwise, the monitor module applies at least one security measure to the core as a result of the timer expiring.
21 Citations
30 Claims
-
1. A method for improved security for a core on a system-on-a-chip (SoC) in a portable computing device (PCD), the method comprising:
-
initializing a monitor module on the SoC; sending a request from the monitor module of the SoC to the core of the SoC; receiving at the monitor module a response from the core; checking a timer in communication with the monitor module; and resetting the timer with the monitor module if the response from the core is received at the monitor module before the expiration of the timer, or applying with the monitor module at least one security measure to the core as a result of the timer expiring. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for improved security for a core in a portable computing device (PCD), the system comprising:
-
a core on a system-on-a-chip (SoC); a monitor module on the SoC in communication with the core; and a timer in communication with the monitor module, wherein the monitor module is configured to; send a request to the core; receive a response from the core; and reset the timer if the response is received by the monitor module before the expiration of the timer, or apply at least one security measure to the core as a result of the timer expiring. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a non-transitory computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for improved security for a core in a portable computing device (PCD), the method comprising:
-
initializing a monitor module on the SoC; sending a request from the monitor module of the SoC to the core of the SoC; receiving at the monitor module a response from the core; checking a timer in communication with the monitor module; and resetting the timer with the monitor module if the response is received at the monitor module before the expiration of the timer, or applying with the monitor module at least one security measure to the core as a result of the timer expiring. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A computer system for improved security for core in a portable computing device (PCD), the system comprising:
-
means for initializing a monitor module on the SoC; means for sending a request from the monitor module of the SoC to the core of the SoC; means for receiving at the monitor module a response from the core; means for checking a timer in communication with the monitor module; and means for resetting the timer if the response is received at the monitor module before the expiration of the timer, or means for applying at least one security measure to the core as a result of the timer expiring. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification