Browse Prior Art Database

Behavioural Hardware Security System based on the users startup routines, habits and/or behaviours.

IP.com Disclosure Number: IPCOM000244186D
Publication Date: 2015-Nov-20
Document File: 3 page(s) / 52K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a system to record and profile the impact of hardware on a system running in parallel, with relation to time and position of the parallel process.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 43% of the total text.

Page 01 of 3

Behavioural Hardware Security System based on the users startup routines, habits and/or behaviours.

Disclosed is a system that monitors the physical input interactions and logging of these input transactions on a device with strict relations to a separate parallel process (or sequence-of-events) running on the device, in order to build a social profile for a user. This newly built profile is then compared against a known social profile of the user and any differences are tracked and stored for further processing at a later stage.

    The solution disclosed works thus:
1 - The system starts upon the initiation of the devices parallel process.
2 - Each time a physical interaction with the device is achieved, the current status of the parallel process is logged. The time relative to the process startup is also noted to build a temporal view of the interactions.
3 - This process is repeated for each physical interaction up until the parallel process reaches its end point or is terminated.
4 - At this point, the physical status of the device is noted and the captured data is analysed and processed into a profile for the devices physical interactions during the parallel processes duration.
5 - This profile is assigned to the current user of the system and is stored for future reference.
6 - If a known user profile already exists, the current profile is compared against the known profile. Any differences between the physical-interaction-points-data that

were captured with relation to each profiles respective parallel processes are

logged.
7 - These logged differences are then sequenced with relation to their time implemented within the profiles.
8 - Based on these differences, further action can be taken directly on the user or a 3rd party operation could then be called.

    A key part of the solution disclosed is that the system works with the relationship of the hardware's impact on the parallel process with respect to time. Such hardware impacts could range from plugging in a USB mouse at a certain time, to a manufacturing arm adjusting a device during manufacturing.

    Such example use cases could be (but not limited to):
1 - User password protection. The system could be used to learn the hardware input habits of a user during machine startup. Any deviance in the known profile of the user could cause the system to call a 3rd party application which would prompt for another password. (See Use-Case Example 1 in more detail below)
2 - Manufacturing unit logging. During a manufacturing stage, any physical interactions with a unit under manufacturing could be logged and a profile derived of the impact of the system on the unit. Such a profile could then be used to ensure that subsequent units undergo the same physical interactions during the manufacturing stage. Any deviance from the profile would likely result in a faulty unit, so this unit can be removed from the manufacturing process for further processing.

    The solution disclosed encompasses the derivatio...