The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Mar. 22, 2022
Filed:
Apr. 25, 2019
British Telecommunications Public Limited Company, London, GB;
BRITISH TELECOMMUNICATIONS public limited company, London, GB;
Abstract
Actuators and sensors in an intelligent system are controlled by setting encryption types and key lengths to individual applications based on the type of device and application being run. A server system () running in a communications gateway, selects an encryption policy for one or more devices under its control. This selection is controlled by an analysis function () using data relating to the type of device (), and the applications to be run on the device (), to generate an appropriate encryption policy () which can be deployed to the device (). Controlling the analysis and deployment in a gateway device allows co-ordination between devices, and reduces processor time in the devices. An agent is sent to the device alongside the encryption policy data, to control the device according to the encryption policy. In response to events detected and analyzed by analysis function (), the server sends triggers () to the agent loaded on the device to modify its encryption type in accordance with the policy previously deployed. Revisions and updates to the deployed policies can also be initiated, in response to dynamic factors such as resource usage (CPU, bandwidth, battery etc.), data sensitivity, external events and notifications of vulnerabilities to device type and applications used, in order to allocate resources more efficiently. Different encryption systems can be applied to different applications or data streams running on the same device, and encryption can be applied actively as and when required, using dynamic analysis of both the device and the application to encrypt data—for example to only encrypt if malware is detected.