PatentAuction.com lists patented inventions available for sale or licensing. Inventors can list their patented inventions (or patent pending) for sale. New inventions for sale are added on a daily basis !
Home    List your patent    My account     Help     Support us    

Secure device and secure data processing in insecure environment

[Category : - Telecommunications]
[Viewed 711 times]

How to securely use electronic devices such as thumb drives, chip cards, cell phones and IoT’s in insecure environment like computer in a library or coffee shop or vending machines on a street corner.

Problem:
MITM is usually referred to an imposter in IP network pretending to be a destination user desired to contact.
In the IT world, MITM can be a SW entity mimicking your communication partner or listening to your electronic communication.
MITM will not necessarily alter your communication. It is bad enough if it can listen and learn from your communication most likely private and confidential information.
Aside IP network, MITM attack can be deployed in different any communication scenarios using any type of interface.
Attack can happen for example:
- when you use your credit card in an infected vending machine or ATM
- when you use mobile Phone to communicate with
. an authentication device, eg door lock
. vending system, eg POS
. car entertainment system, eg loudspeaker system in a rental car
- when you use your electronic-Safe device eg password-safe
- or any other electronic device capable of any type communication like:
. electronic Watch
. heart monitor
. pace maker
. knew prostheses
. wristband health monitor
. tablet
. personal voice recorder
. door badge
. industrial:
. IoT or IIoT
. hand held bar code scanner
. GPS logger
. and also any military electronic device
Such communication may use wired or contact interfaces like USB and chip-in, or wireless and contactless communication like wifi, RFC and BLE

When devices communicate with each other they usually use known protocols and employ security measures like encryption.

Solution:
To increase protection, devices can use personalized and more sophisticated communication methods such as private driver.
A private driver can be uploaded at the start of communication.
A private drive is not bound to a publicly known protocol or publicly known encryption.
Here comes the solution presented and claimed by this patent.
- use private driver
- secure the communication of a device by a private driver employing:
. unique methods claimed in this patent
. randomized interface-commands claimed in this patent
. analyze threats and attacks at all time and take contra measures
- cleanup driver and traces when terminating communication

Please note such a private driver may use any means and methods to full-fill its task.
For example a task maybe sending an encrypted message to a destination or authenticate the user or assess an environment user intent to use or executing a system command.
This patent intends to secure communication from an external device to a local or remote application by employing methods that cannot be decrypted or reverse engineered.










[ Home | List a patent | Manage your account | F.A.Q.|Terms of use | Contact us]

Copyright PatentAuction.com 2004-2017
Page created at 2024-11-25 5:42:18, Patent Auction Time.