SYSTEM SECURITY
20230050007 · 2023-02-16
Inventors
Cpc classification
G06F2221/2141
PHYSICS
G06F21/57
PHYSICS
International classification
G06F21/57
PHYSICS
Abstract
In accordance with embodiments of this disclosure, a method of securing a processing unit according to some embodiments includes receiving a request for access from a user; detecting a device; determining whether the device is a trusted device; and providing the user access to the processing unit only if the device is a trusted device. In some embodiments, the trusted device may be a Bluetooth device.
Claims
1. A method of securing a processing unit, comprising: receiving a request for access from a user; detecting a device; determining whether the device is a trusted device; and providing the user access to the processing unit only if the device is a trusted device.
2. The method of claim 1, wherein the trusted device is associated with the user and providing access includes verifying that the user is the one associated with the trusted device.
3. The method of claim 1, wherein the device is a Bluetooth device.
4. The method of claim 1, wherein the device is coupled to the processing unit by direct connection.
5. The method of claim 1, further including removing the device and denying access to the user in the absence of the device.
6. The method of claim 1, wherein detecting a device includes querying devices; and receiving IDs from devices to determine a trusted device.
7. The method of claim 1, wherein determining whether the device is a trusted device by determining that a unique ID provided by the device is included in a recorded list of trusted devices.
8. A method of operating a trusted device to secure a processing unit, comprising: receiving a device query from the processing unit; verifying a user; and if the user is verified, sending an ID to the processing unit.
9. The method of claim 8, wherein verifying the user includes biometric authentication of the user.
10. The method of claim 8, wherein the trusted device is a Bluetooth device.
11. The method of claim 8, wherein the trusted device is directly connected to the processing unit.
12. A method of registering a device to secure a processing unit as a trusted device, comprising: receiving a request to register the device from a user; verifying the user as an administrator of the processing unit; if the user is verified as an administrator of the processing unit, detecting one or more devices; reporting the one or more devices to the user; receiving an identified device of the one or more devices from the user; and storing the identified device as the trusted device with the processing unit.
13. The method of claim 12, wherein verifying the user as an administrator includes detecting a trusted device associated with the user; if the trusted device is detected, determining that the user is an administrator.
14. The method of claim 12, wherein the processing unit is included in a system.
15. The method of claim 14, wherein the system is an autonomous vehicle.
16. The method of claim 14, wherein the system is a utility.
Description
BRIEF DESCRIPTION OF THE FIGURES
[0010]
[0011]
[0012]
[0013]
[0014]
[0015] These figures are further discussed below.
DETAILED DESCRIPTION
[0016] In the following description, specific details are set forth describing some embodiments of the present invention. It will be apparent, however, to one skilled in the art that some embodiments may be practiced without some or all of these specific details. The specific embodiments disclosed herein are meant to be illustrative but not limiting. One skilled in the art may realize other elements that, although not specifically described here, are within the scope and the spirit of this disclosure.
[0017] This description illustrates inventive aspects and embodiments should not be taken as limiting—the claims define the protected invention. Various changes may be made without departing from the spirit and scope of this description and the claims. In some instances, well-known structures and techniques have not been shown or described in detail in order not to obscure the invention.
[0018]
[0019] Furthermore, computer system 102 can communicate with other systems 118 through network 104 or closely located systems 122 through wireless communications. Other systems 118 or system 122 can, for example, be traffic control systems, service information systems, other systems having computer systems such as system 102.
[0020] As is illustrated in
[0021] Further, as is illustrated in
[0022] However, as is further illustrated in
[0023] In particular, in accordance with aspects of the present disclosure, computer 102 allows access to a user through user device 116 only in the presence of a trusted device 114. Trusted device 114 is a device that has been previously registered as a trusted device in computer system 102. Computer system 102 can detect the presence of trusted device 114, for example, using Bluetooth, or other wireless or wired system. Trusted device 114 may use any communications, for example wireless communications, method for communicating with computer 102. Additionally, in some aspects of the disclosure, trusted device 114 verifies the identity of the user of user device 116. Such verification can be performed biometrically (e.g., fingerprint, facial recognition, etc.), although the use of passwords may also be used. In some embodiments, user device 116 may include trusted device 114.
[0024]
[0025] Processor 204 can be any combination of microprocessors, microcomputers, application specific ICs (ASICs), state functions, or other devices or combinations of devices that are capable of operating as described below. Processor 204 can include numerous individual processors, which are capable of performing the functions of system 120.
[0026] As illustrated in
[0027] As is further illustrated in
[0028] As is further illustrated, processor 202 is coupled to a system interface 216 that interfaces with components of system 120 so that processing unit 200 can control operation of the site (e.g. utility system or other system). In an autonomous vehicle, for example, system interface 216 can interface to system controls 110 that include controls for steering and acceleration, monitoring of vehicle operations, etc. In a pipeline control system, system interface 216 can communicate with system controls 110 that include valves and other such devices.
[0029] As is further illustrated, processor 202 is further coupled to a system sensors interface 214 that interfaces to system sensors 112 that includes, for example, all sensors incorporated in system 100. In an autonomous vehicle, for example, system sensors 112 can include, for example, GPS navigation, inertial sensors, radar, LIDAR, cameras, ultrasound, or other sensors that allow processing unit 200 to “see” its surroundings. In a pipeline system, for example, system sensors 112 can include, for example, flow sensors, temperature gauges, and other systems that monitor operation of the pipeline.
[0030] Processor 202 is also coupled to a user interface 218. User interface 218 can include any combination of video displays, touch screens, buttons, knobs, keyboards, audio microphones, speakers, and other devices that allows processing unit 200 to relay information (e.g., provide infotainment services, display GPS maps, provide vehicle specific messages, etc.) and receive input (e.g., vehicle parameter settings, radio stations, environmental controls, etc.) from a user of vehicle 102. User device 116 can be, for example, incorporated into user interface 218 or user device 116 may interface with computer system 102 through wireless interface 210 or wired interface 212.
[0031] In accordance with aspects of the present disclosure, memory 204 includes, along with the trusted devices list 220, instructions that interact with services 108 and user device 116 to prevent hacking as discussed further below. In particular, as discussed below when a user requests access to computer system 102 through user device 116, computer system 102 detects presence of a trusted device 114 that may have separately verified the identity of the user.
[0032] Once user device 116 is paired with processing unit 200 and services 108, user device 116 can be used access computer system 102 and direct computer system 102 to access services 108 through cloud network 104. In some aspects, trusted device 114 may be queried periodically while the user is accessing computer system 102 to verify that the user continues to be present. Any instructions sent to computer system 102 can be verified prior to those commands being executed. A hacker trying to hack into computer system 102, then, will be thwarted by the verification process that requires the presence of trusted device 114. If the computer system 102 does not detect the presence of trusted device 114 (e.g. via Bluetooth), then the computer system 102 may send all identifying info from the hackers to a central repository to build a database for law enforcement investigation. The computer system 102, or a monitoring system through network 104, can further use an AI to look for patterns to identify Hackers.
[0033]
[0034]
[0035] In processing unit 200, if in response to query devices 318 there are no unqueried devices as determined in step 320, the processing unit 200 proceeds to step 322 where the access procedure is stopped. Otherwise, processing unit received the ID from device 114 in step 324 and proceeds to step 326. In step 326, processing unit 200 determines from the ID whether device 114 is listed in the trusted device list 220 and, in some cases, is associated with the particular user. In some embodiments, processing unit 200 may also verified user receiver from device 114 is associated with the ID. If not, then processing unit 200 returns to step 318 to search for another device 114. If it is on list 114, then processing unit 200 proceeds to step 328 where access is allowed. User device 116 is then provided access 314 to computer system 102. In step 330 of processing unit 200, removal of the trusted device 114 can be detected. If that removal is detected, processing unit 200 proceeds to step 332 where access is again denied to computer system 102.
[0036]
[0037] In step 410, if the user is verified as an administrator then procedure 400 proceeds to step 414. In step 414, processor 200 detects available devices 404. Although a single available device 404 is illustrated in
[0038] In some embodiments, the trusted device is a Bluetooth device that is in the immediate vicinity of computer 102, which itself interacts with its surroundings. In some embodiments, computer 102 may be coupled through network 104 to other systems 118 that are situated to operate in their surroundings. Access to computer 102 as described above can provide remote access to the further connected systems. Further access to other systems 118 as described above may provide that user with access to computer system 102.
[0039] Phishing attacks are a common problem these days. Embodiments of the present disclosure can be used to prevent phishing attacks as well. Phishing attacks would be received, typically, at user device 116, and possibly at processing unit 200 as a request for action. In some embodiments, AI can be used to read the sender's email address and compare with actual emails or communications from services 108 and, if they are not the same, delete or quarantine the emails. These emails, that typically would spoof communications from services 108, can be stored and analyzed as well.
[0040] Embodiments of the invention described herein are not intended to be limiting of the invention. One skilled in the art will recognize that numerous variations and modifications within the scope of the present invention are possible. Consequently, the present invention is set forth in the following claims.