Secured automated or semi-automated systems
First Claim
Patent Images
1. A system, comprising:
- a sensor;
a legacy computing environment further comprising a specialized hardware processor that is configured to;
communicate with the sensor and receive and process raw sensor data output, the raw sensor data output representing unaltered data directly received from the sensor, and upon processing, results in processed sensor output; and
transmit the processed sensor output to a first network node over a network or via a trusted computing environment; and
the trusted computing environment further comprising a specialized hardware processor configured to;
receive the raw sensor data output directly from the sensor; and
transmit the raw sensor data output to an additional network node or the first network node over the network, the raw sensor data output being used to authenticate the processed sensor output, the trusted computing environment being further configured to detect malware infection or a malfunction by comparing test input data to the legacy computing environment and evaluating legacy computing environment output resulting from a legacy computing environment program using the test input data.
0 Assignments
0 Petitions
Accused Products
Abstract
Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is configured to communicate with the sensor and process sensor raw data output, and transmit the processed sensor output to a first network node over the network, and a trusted computing environment configured to receive raw sensor output directly from the sensor and transmit the raw sensor output to an additional network node or the first network node over the network.
62 Citations
11 Claims
-
1. A system, comprising:
-
a sensor; a legacy computing environment further comprising a specialized hardware processor that is configured to; communicate with the sensor and receive and process raw sensor data output, the raw sensor data output representing unaltered data directly received from the sensor, and upon processing, results in processed sensor output; and transmit the processed sensor output to a first network node over a network or via a trusted computing environment; and the trusted computing environment further comprising a specialized hardware processor configured to; receive the raw sensor data output directly from the sensor; and
transmit the raw sensor data output to an additional network node or the first network node over the network, the raw sensor data output being used to authenticate the processed sensor output, the trusted computing environment being further configured to detect malware infection or a malfunction by comparing test input data to the legacy computing environment and evaluating legacy computing environment output resulting from a legacy computing environment program using the test input data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
an actuator; a legacy computing environment further comprising a specialized hardware processor coupled with the actuator, the legacy computing environment configured to; process input commands into actuator commands, for the actuator; and process the input commands and actuator state sensor raw data output to optimize actuator response; and a trusted computing environment further comprising a specialized hardware processor coupled to the actuator, the trusted computing environment configured to; receive the actuator state sensor raw data output directly from the actuator; and transmit the actuator state sensor raw data output to a network node over a network where the actuator unaltered state sensor raw data output is used to authenticate a state of the actuator, the trusted computing environment being further configured to compare commands received from the network with the actuator state sensor raw data output to determine when the legacy computing environment of an actuator system is infected with malware or is malfunctioning. - View Dependent Claims (8, 9, 10, 11)
-
Specification