The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 09, 2024

Filed:

Nov. 24, 2020
Applicant:

Bae Systems Information and Electronic Systems Integration Inc., Nashua, NH (US);

Inventors:

Sheldon L. Grass, Chester, NH (US);

Alfreda M. DeLong, Billerica, MA (US);

Jonathan P Ingraham, Pelham, NH (US);

Noel A. Zenga, Derry, NH (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/57 (2013.01); G06F 9/4401 (2018.01); G06Q 10/0635 (2023.01); G06Q 10/0637 (2023.01); G06Q 10/0639 (2023.01); G06Q 10/067 (2023.01); G06Q 10/0875 (2023.01); G06Q 10/101 (2023.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 9/4401 (2013.01); G06Q 10/0635 (2013.01); G06Q 10/06375 (2013.01); G06Q 10/06393 (2013.01); G06Q 10/06395 (2013.01); G06Q 10/067 (2013.01); G06Q 10/0875 (2013.01); G06Q 10/101 (2013.01); G06F 2221/034 (2013.01); G06Q 2220/00 (2013.01);
Abstract

A method for a system for security evaluation includes working one state at a time; identifying primitives of interest and systematically applying relevant attacks for the system; starting at chip level, working through states, and then expanding a system boundary and repeating; following a sequence of: chip>circuit card>subsystem>system>platform for a product solution under analysis; determining if a system definition has sufficient detail, or is too abstract; for a chip with a native secure boot protocol, determining if all players are represented; representing attacks as vectors made up of measurements of the following attributes: Dollars, days, Probability of success, Probability of destruction, technology node, and number of samples; and representing countermeasures as vectors made up of scaling factors for each of attack attributes.


Find Patent Forward Citations

Loading…