Abstract: Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a device under protection including at least one security processor, the at least one certificate providing device information related to the security of the electronic device, and comparing with at least one autonomous processor of an autonomous system the device information to the security requirement information. The at least one autonomous processor may instruct the at least one security processor to provide the secure resource to the device when the device information meets the security requirement information. The device under protection may provide the secure resource to the electronic device in response to the instruction.
Type:
Grant
Filed:
November 11, 2015
Date of Patent:
February 6, 2018
Assignee:
TEMPORAL DEFENSE SYSTEMS, LLC
Inventors:
Ronald Lance Justin, Charles Elden, Jared Karro, Mark Tucker
Abstract: A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score.
Type:
Grant
Filed:
February 27, 2015
Date of Patent:
September 19, 2017
Assignee:
TEMPORAL DEFENSE SYSTEMS, LLC
Inventors:
Mark Tucker, Charles Elden, Jared Karro
Abstract: A computer implemented method includes introducing unpredictable temporal disruptions to the operating states of an authorized process and an unauthorized process. The authorized process is migrated to a virtual machine to avoid the unpredictable temporal disruptions while the unauthorized process is subject to the unpredictable temporal disruptions and thereby experiences an unstable environment that induces operating faults.
Abstract: A computer implemented method includes introducing unpredictable temporal disruptions to the operating states of an authorized process and an unauthorized process. The authorized process is migrated to a virtual machine to avoid the unpredictable temporal disruptions while the unauthorized process is subject to the unpredictable temporal disruptions and thereby experiences an unstable environment that induces operating faults.