Secure failsafe apparatus

ABSTRACT

According to some embodiments, an electronic device can implement a failsafe action. The system comprises a processor and a computer-readable medium comprising processor executable instructions, that when executed by the processor, performs a method, the method comprises receiving a first antidote message within a first time interval. Based on receiving the first antidote message, continuing normal operation of the electronic device is continued. The electronic device waits for reception of a second antidote message within a second time interval. A determination is made that the second antidote message was not received within the second time interval. In response to determining that the second antidote message was not received, implementing a first failsafe action.

BACKGROUND

Networkable devices (e.g., phones, storage devices, sensors, IoTdevices, routers, network servers, a robot or large-scale machines) arenormally connected via a network or are in communication with anotherdevice. Devices that are removed from the network, or can't communicatewith the network cannot maintain connectivity with the network or theother devices on the network. In this situation, it may not be possibleto send commands to disable the devices or erase the data in thedevices. If a networkable device is removed from a network (e.g., thedevice is stolen), the data on that device could be used to hack thenetwork or steal personal information about users or other devices onthe network (e.g., stealing routers, database servers, flash drives,etc.).

It would therefore be desirable to provide a system to preventnetworkable devices from being compromised and being used to causefurther harm to users or network devices.

SUMMARY

Some embodiments described herein relate to an electronic device thatcan implement a failsafe action to reduce further harm to users ornetwork devices in a case that the electronic device is removed from anetwork. The electronic device comprises a processor and acomputer-readable medium comprising processor executable instructions,that when executed by the processor, performs a method. The methodcomprises receiving a first antidote message within a first timeinterval. Based on receiving the first antidote message, continuingnormal operation of the electronic device. The electronic device waitsfor reception of a second antidote message within a second timeinterval. A determination is made that the second antidote message wasnot received within the second time interval. In response to determiningthat the second antidote message was not received, a first failsafeaction is implemented.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a network in accordance with some embodiments.

FIG. 2 illustrates a method in accordance with some embodiments.

FIG. 3 illustrates an electronic device according to some embodiments.

DETAILED DESCRIPTION

In the following detailed description, numerous specific details are setforth in order to provide a thorough understanding of the embodiments.However, it will be understood by those of ordinary skill in the artthat the embodiments may be practiced without these specific details. Inother instances, well-known methods, procedures, components and circuitshave not been described in detail so as not to obscure the embodiments.

The present embodiments relate to a failsafe system for electronicdevices (e.g., phones, storage devices, sensors, IoT devices, routers,network servers, a robot or large-scale machines) that are normallyconnected via a network or are in communication with another device. Insome embodiments, an electronic device may receive a module comprisingprocessor executable steps to implement the embodiments described hereinto initiate failsafe actions on the electronic device. The presentembodiments may be implemented as either hardware (e.g., a chip) or assoftware modules to exiting products. For example, a third party mayinclude software modules for implementing failsafe methods in a softwarelibrary and an electronic device may implement the failsafe methods bycalling one or more APIs from the software library. For example, as witha mesh network, all devices on the mesh network may simply receive andverify a message that is broadcasted over the mesh network. All deviceson the network that can receive and verify the broadcast message maymaintain normal operations. Devices removed from the network, or devicesthat can't communicate with the network may not be able to receive andverify these messages. These devices that can't communicate with thenetwork or can't verify the message may trigger a failsafe action. Insome embodiments, the failsafe might trigger if the transmitter of themessage is not a verified transmitter of the message (e.g.,authentication of the message fails or the message comes from an IPaddress that is not approved by the receiving device). In someembodiments, the failsafe might trigger if one or more conditionsembedded in the antidote message are not satisfied. For example, theantidote message may comprise a specific serial number pattern or adevice type identification which must be matched at the local device foran antidote message to be confirmed and accepted. In another example,the antidote message may indicate a specific device status to bematched, such as the operation currently being executed, current memorycontent or a CPU register value, input or output power, as well asdetectable environmental data (e.g., temperature).

The present embodiments further relate to a hard or soft coded failsafesystem that monitors for predefined events (e.g., the electronic deviceis out of the signal reception range, predefined messages are notreceived and/or cannot be verified, or the device stops transmitting)and if one, or more, of these predefined events occurs, one or morefailsafe actions may be performed.

Now referring to FIG. 1, an embodiment of a network system 100 isillustrated. As illustrated in FIG. 1, a first device 110 and a seconddevice 120 may be electrically coupled to a network 130. The network 130may comprise any wired or wireless network that may be used forcommunication purposes between electronic devices. For example, thenetwork 130 may comprise, but is not limited to, a wired and/or wirelessmesh network, LAN, MAN, or WAN.

For purposes of illustration, the first device 110 may comprise anelectronic device such as, but not limited to, a phone, a storagedevice, an IoT device, a router, or a network server. Also, for purposesof illustration, the second device 120 may function as a master computerand may comprise, but is not limited to, a server, a signal station, ahub, a switch, a controller or a router. In a case that the first device110 is stolen, a thief might have removed the first device 110 from itsoriginal location in an attempt to steal data stored on the first device110 which could cause a security breach to a network or personalinformation. In some embodiments, the thief might attempt to install amalicious software application (e.g., a virus) on the first device 110and then and put the first device 110 back without anyone being aware ofthe first device 110 being absent from the network 130. In someembodiments, the first device 110, such as a laptop or a flash drive,may simply be lost by a user leaving it available for anyone to takepossession of the first device 110. In one example, the first device110, may comprise a robot or large scale machine that may lose itsconnection to a control center and the first device 110 may becomeout-of-control or may perform an unexpected behavior. In anotherexample, the first device 110, may comprise a weapon (or motor vehicle),and the first device 110 may be lost or stolen and may be used to harman owner of the first device 110 or may be used for other criminalactivities.

The present embodiments described herein further relate to the firstdevice 110 periodically receiving an antidote message from the seconddevice 120. The antidote message may comprise a message that is receivedby the first device 110 to indicate to the first device 110 that itshould not implement a failsafe action. Failsafe actions may comprise atleast one of pausing a current operation of the first device 110 for apre-determined amount of time, stopping the current operation of thefirst device 110, resetting the electronic device to a preset or factorystate, clearing partial or all data stored in the first device 110,disabling specific functionalities or features or the first device 110,initiating a self-destruct sequence, reducing current and/or voltageassociated with the electronic device, and/or sending a notification toan authorized user.

Failure to receive an antidote message at the first device 110 within apre-defined time period may instruct the first device 110 to implement afailsafe action as will be described in more detail with respect to FIG.2.

In an alternate embodiment, a third device (not shown in FIG. 1) may beplaced or inserted into the first device 110 to function as a failsafeimplementor and an antidote message receiver. For example, the thirddevice may comprise a card or chip (e.g., a non-transitory computerreadable medium) that is inserted into the first device 110. This cardor chip may comprise the logic and receiver to implement the embodimentsdescribed herein. In another alternate embodiment, the first device 110may function as a failsafe implementor and an antidote message receiverfor the second device 120. For example, the first device 110 may be usedto implement failsafe actions on device 120 in response to not receivingan antidote message at 110. In other words, the failsafe action may becarried out at a different device than the device receiving, or notreceiving, the antidote message. In this embodiment, the first device110 may send commands to the second device 120 to implement the failsafeaction.

Now referring to FIG. 2, a method 200 that might be performed by anelectronic device, such as the first device 110, described with respectto FIG. 1, is illustrated according to some embodiments. The methoddescribed herein does not imply a fixed order to the steps, andembodiments of the present invention may be practiced in any order thatis practicable. Note that any of the methods described herein may beperformed by hardware, software, or any combination of these approaches.For example, a non-transitory computer-readable storage medium may storethereon instructions that when executed by a machine result inperformance according to any of the embodiments described herein.

Method 200 may relate to implementing a failsafe action on an electronicdevice based on a failure to receive an antidote message. Now referringto 210, a first antidote message is received at an electronic devicewithin a first time interval. The time interval may be a userpre-defined setting, or a system defined time interval set by a mastercomputer, such as second device 120. The antidote message may compriseinformation that identifies a known sender of the antidote message, atime stamp, a list of conditions to be satisfied, and a hash code thatmay be used for verification by the electronic device. A system definedtime interval may change based on current system usage and availablebandwidth. In some embodiments, a sender of the antidote message (e.g.,the master computer, router, server, etc.) may send a global timeinterval update message to periodically adjust the system defined timeinterval. For example, and in the case of a mesh network, the mastercomputer may update the system defined time intervals across an entiremesh based on a current use and potential risk factor (e.g., adetermination of risk may be defined by a system operator) associatedwith the mesh network.

For purposes of illustrating features of the present embodiments, somesimple examples will now be introduced and referenced throughout thedisclosure. Those skilled in the art will recognize that these examplesare illustrative and are not limiting and are provided purely forexplanatory purposes. In some embodiments, a system may default to sendantidote messages every 5 minutes. Thus, in this example the systemdefined time interval is defined as every 5 minutes. Therefore, theelectronic device may set a counter to determine if an antidote messageis received within the five-minute period.

Next, at 220, normal operation of the electronic device is continuedbased on receiving the first antidote message. Thus, in the presentexample, reception of the first antidote message may reset a timer inthe electronic device to wait for a next antidote message. The timer maybe integral to a processor located within the electronic device. In someembodiments, the timer may be separate from the processor. In someembodiments, the first antidote message may be validated prior tocontinuing normal operation of the electronic device. Validation may bebased on one or more of decoding a hash code within the antidotemessage, symmetric-key cryptography, and public-key cryptography. Insome embodiments, the first antinode message may contain a list ofrequired conditions that must be satisfied for validation of the firstantidote message. For example, conditions may comprise, but are notlimited to, the first antidote message coming from a specific device, apattern of a device serial number of the sending machine or theelectronic device (e.g., first device 110), the device type, currentstatus of the device (e.g., current, voltage, temperature,operation/state), an operation currently being executed, current memorycontent or a CPU register value, input and/or output power, or externalenvironmental data. For example, devices contained within a server roommay experience a limited range of temperatures (e.g., between 65 and 68degrees with little fluctuation). This temperature range may act as anindication that a device is in its proper location. Therefore, if adevice is moved to a location that does not have a similar temperaturerange (e.g., a car, a car trunk) the device may not validate an antidotemessage since a condition (e.g., temperature range) has not been met.Similarly, if the master computer indicates an external temperature inthe antidote message that is out of range from what the receivingmachine is experiencing, the antidote message may not be validated.

Once normal operation continues, the electronic device may wait forreception of a second antidote message within a second time interval at230. While waiting for the second antidote message, the electronicdevice may continue to operate normally. At the end of the second timeinterval, the timer may indicate to the processor that the second timeinterval has expired. Accordingly, a determination may be made, by aprocessor, that the second antidote message was not received within thesecond time interval at 240. Once the processor receives an indicationfrom the timer that the second time interval has expired, a firstfailsafe action may be implemented in response to determining that thesecond antidote message was not received at 250.

The first failsafe action may comprise at least one of pausing a currentoperation of the electronic device for a pre-determined amount of time,stopping the current operation of the electronic device, resetting theelectronic device to a preset or factory state, clearing partial or alldata stored in the electronic device, disabling specific functionalitiesor features or the electronic device, initiating a self-destructsequence, reducing current and/or voltage associated with the electronicdevice, and/or sending a notification to an authorized user.

Continuing with the above example, an antidote message was not receivedwithin a next 5-minute period. The timer may then indicate to theprocessor that the 5-minute time period has expired. The processor maythen initiate a failsafe action based on a pre-defined list of failsafeactions that should be taken after one antidote message has been missed.In some embodiments, determining a failsafe action may be based on apre-defined list of actions that are based on a number of antidotemessages that have been missed. For example, implementing the firstfailsafe action in response to determining that the second antidotemessage was not received may further comprise determining a thresholdnumber of antidote messages that have not been received during expectedtime intervals. In some embodiments, the electronic device may notinitiate a failsafe action after missing only one antidote message. Inthis embodiment, a preset number of missed, or consecutively missed,antidote messages may trigger a failsafe action. For example, the presetnumber may comprise 3 consecutive missed antidote messages to allow forsystems to be rebooted or updated without triggering a failsafe action.

In some embodiments, it may be determined that a third antidote messagewas not received within a third time interval. In other words, at leasttwo antidote messages were not received during their respective timeintervals (e.g., either consecutive or non-consecutive time intervals).In response to the third antidote message not being received within athird time interval, a second failsafe action may be implemented wherethe second failsafe action is different than the first failsafe action.In other words, a first failsafe action may be implemented in responseto missing the second antidote message. This first failsafe action maybe a simple action that merely temporarily stops a device from operatingwhile the second failsafe action may be more severe such as erasing dataor permanently disabling a device from operating.

In some embodiments, prior to implementing the first failsafe action,the electronic device may transmit a request for an antidote message inresponse to determining that the second antidote message was notreceived within the second time interval. For example, after the timerindicates to the processor that a time frame to receive an antidotemessage has expired, the processor may initiate a request for anantidote message that may then be transmitted to the device that sendsantidote messages. This may be useful when an antidote message is misseddue to some network anomaly. However, if the request is not answeredwithin a preset period of time, the first failsafe action may then beimplemented.

In another embodiment, prior to implementing the first failsafe action,the electronic device may transmit a request to extend the second timeinterval for the second antidote message. For example, a user mayrealize that a system is going to be rebooted or updated with newsoftware so the user may request a temporary longer time period. In thecase when a request to extend the second time interval for the secondantidote message was transmitted, a denial to the request to extend thesecond time interval may be received. In other words, a master computermay deem that an extension is not permitted based on current systemneeds or a pre-defined security policy at the master computer.Therefore, a denial may then be sent to the electronic device. However,if the current system needs or the pre-defined security policy at themaster computer may allow an increase in a time period, a command toextend a time interval for an antidote message may be received at theelectronic device. In some embodiments, the command to extend a timeinterval for an antidote message may be received without having to havesent a request.

In some embodiments, as in the case where the electronic devicecomprises a smart battery, that can increase or decrease its voltage andcurrent, the first failsafe action may comprise (1) temporarily orpermanently reducing current or voltage of a battery within theelectronic device to stop the electronic device from functioning or (2)increasing the current or voltage of the battery to cause electricalcomponents within the device to permanently stop functioning (e.g.,permanently damage electrical components). A smart battery may comprisea voltage and/or current controller embedded within the battery thatreceives instructions from the processor to instruct the battery tochange an output of the battery. Changing an output of a battery mayprevent an electronic device from operating. For example, someelectronic devices may comprise components that are sensitive to changesin voltage and/or current. Thus, for example, the battery may increasevoltage from 5 volts to 30 volts to cause the components to “fry” orpermanently cease functioning.

Note the embodiments described herein may be implemented using anynumber of different hardware configurations. For example, FIG. 3illustrates an electronic device 300 that may be, for example,associated with the system 100 of FIG. 1. The electronic device 300 mayprovide a technical and commercial advantage by being able to implementa failsafe action to reduce the changes of the device itself or the datastored on the electronic device from being compromised.

The electronic device 300 may comprise a processor 310 (“processor”),such as one or more commercially available Central Processing Units(CPUs) in the form of one-chip microprocessors, coupled to acommunication device 320 configured to communicate via a communicationnetwork (not shown in FIG. 3). The communication device 320 may be usedto communicate, for example, with one or more machines on a network. Theelectronic device 300 further includes an input device 340 (e.g., amouse and/or keyboard to enter information about failsafe actions orsystem time intervals) and an output device 330 (e.g., to output anddisplay the data and/or alerts).

The processor 310 also communicates with a memory 325 and storage device350 that stores data 313. The storage device 350 may comprise anyappropriate information storage device, including combinations ofmagnetic storage devices (e.g., a hard disk drive), optical storagedevices, mobile telephones, and/or semiconductor memory devices. Thestorage device 350 may store a program 312 and/or processing logic 313for controlling the processor 310. The processor 310 performsinstructions of the programs 312, 313, and thereby operates inaccordance with any of the embodiments described herein. For example,the processor 310 may receive data from a timer integral to theprocessor 310 and may institute a failsafe action via the instructionsof the programs 312 and processing logic 313.

The programs 312, 313 may be stored in a compiled, compressed,uncompiled and/or encrypted format or a combination. The programs 312,313 may furthermore include other program elements, such as an operatingsystem, a database management system, and/or device drivers used by theprocessor 310 to interface with peripheral devices.

As will be appreciated by one skilled in the art, the presentembodiments may be embodied as a system, method or computer programproduct. Accordingly, the embodiments described herein may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, the embodiments described herein may take the form of acomputer program product embodied in one or more computer readablemedium(s) having computer readable program code embodied thereon.

The process flow and block diagrams in the figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

It should be noted that any of the methods described herein can includean additional step of providing a system comprising distinct softwaremodules embodied on a computer readable storage medium; the modules caninclude, for example, any or all of the elements depicted in the blockdiagrams and/or described herein. The method steps can then be carriedout using the distinct software modules and/or sub-modules of thesystem, as described above, executing on one or more hardwareprocessors. Further, a computer program product can include acomputer-readable storage medium with code adapted to be implemented tocarry out one or more method steps described herein, including theprovision of the system with the distinct software modules.

This written description uses examples to disclose multiple embodiments,including the preferred embodiments, and also to enable any personskilled in the art to practice the invention, including making and usingany devices or systems and performing any incorporated methods. Aspectsfrom the various embodiments described, as well as other knownequivalents for each such aspects, can be mixed and matched by one ofordinary skill in the art to construct additional embodiments andtechniques in accordance with principles of this application.

Those in the art will appreciate that various adaptations andmodifications of the above-described embodiments can be configuredwithout departing from the scope and spirit of the claims. Therefore, itis to be understood that the claims may be practiced other than asspecifically described herein.

1. An electronic device, comprising: a processor; and a non-transitorycomputer-readable medium comprising processor executable instructions,that when executed by the processor, performs a method, the methodcomprising: receiving a first antidote message within a first timeinterval at the electronic device where the first antidote message istransmitted from an external second device; validating the receivedfirst antidote message based on (i) decoding the antidote message and(ii) determining if conditions defined in the first antidote message aremet, wherein the conditions comprise at least one of matching (i) avoltage associated with the electronic device, (ii) an electroniccurrent associated with the electronic device, (iii) a temperatureassociated with the electronic device, (iv) a temperature associatedwith the external second device and (v) an operation currently beingexecuted; continuing normal operation of the electronic device based onreceiving the first antidote message and the validation; waiting forreception of a second antidote message from the external second devicewithin a second time interval; determining that the second antidotemessage was not received from the external second device within thesecond time interval; and implementing, at the electronic device, afirst failsafe action in response to determining that the secondantidote message was not received from the external second device. 2.The electronic device of claim 1, wherein the first failsafe comprisesat least one of pausing a current operation of the electronic device fora pre-determined amount of time, stopping the current operation of theelectronic device, resetting the electronic device to a preset orfactory state, clearing partial or all data stored in the electronicdevice, disabling specific functionalities or features or the electronicdevice, initiating a self-destruct sequence, reducing current and/orvoltage associated with the electronic device, and sending anotification to an authorized user.
 3. The electronic device of claim 1,wherein the first failsafe action comprises sending an instruction to abattery located on the electronic device to reduce current or voltage ofa battery within the electronic device to stop the electronic devicefrom functioning in response to the instruction.
 4. The electronicdevice of claim 1, further comprising validating the first antidotemessage prior to continuing normal operation of the electronic device.5. The electronic device of claim 1, wherein implementing the firstfailsafe action in response to determining that the second antidotemessage was not received further comprises determining that a thresholdnumber of antidote messages, that is greater than one, have not beenreceived during expected time intervals.
 6. The electronic device ofclaim 1, wherein the method further comprises: prior to implementing thefirst failsafe action, transmitting a request for an antidote message inresponse to determining that the second antidote message was notreceived within the second time interval.
 7. The electronic device ofclaim 1, wherein the method further comprises: prior to implementing thefirst failsafe action, transmitting a request to extend the second timeinterval for the second antidote message.
 8. The electronic device ofclaim 7, wherein the method further comprises: prior to implementing thefirst failsafe action, receiving a denial to the request to extend thetime interval for an antidote message.
 9. The electronic device of claim1, wherein the method further comprises: prior to implementing the firstfailsafe action, receiving a command to extend a time interval for anantidote message.
 10. The electronic device of claim 1, wherein themethod further comprises: determining that a third antidote message wasnot received within a third time interval; and implementing a secondfailsafe action in response to determining that the third antidotemessage was not received where the second failsafe action is differentthan the first failsafe action.
 11. An electronic device, comprising: aprocessor; and a non-transitory computer-readable medium comprisingprocessor executable instructions, that when executed by the processor,performs a method, the method comprising: receiving a first antidotemessage within a first time interval at the electronic device where thefirst antidote message is transmitted from an external second device;validating the received first antidote message based on (i) decoding theantidote message and (ii) determining if conditions defined in the firstantidote message are met, wherein the conditions comprise at least oneof matching (i) a temperature associated with the electronic device,(ii) a temperature associated with the external second device (iii) anoperation currently being executed, (iv) symmetric-key cryptography and(v) asymmetric key cryptography; continuing normal operation of theelectronic device based on receiving the first antidote message and thevalidation; waiting for reception of a second antidote message from theexternal second device within a second time interval; determining thatthe second antidote message was not received within the second timeinterval from the external second device; and implementing, at theelectronic device, a first failsafe action in response to determiningthat the second antidote message was not received from the externalsecond device.
 12. The electronic device of claim 11, wherein the firstfailsafe comprises at least one of pausing a current operation of theelectronic device for a pre-determined amount of time, stopping thecurrent operation of the electronic device, resetting the electronicdevice to a preset or factory state, clearing partial or all data storedin the electronic device, disabling specific functionalities or featuresor the electronic device, initiating a self-destruct sequence, reducingcurrent and/or voltage associated with the electronic device, andsending a notification to an authorized user.
 13. The electronic deviceof claim 11, wherein the non-transitory computer readable mediumcomprises a card or chip that is inserted into the electronic device.14. The electronic device of claim 11, wherein implementing the firstfailsafe action in response to determining that the second antidotemessage was not received further comprises determining a thresholdnumber of antidote messages, that is greater than one, that have notbeen received during expected time intervals.
 15. The electronic deviceof claim 11, wherein the method further comprises: prior to implementingthe first failsafe action, transmitting a request for an antidotemessage in response to determining that the second antidote message wasnot received within the second time interval.
 16. The electronic deviceof claim 11, wherein the method further comprises: prior to implementingthe first failsafe action, transmitting a request to extend the secondtime interval for the second antidote message.
 17. The electronic deviceof claim 16, wherein the method further comprises: prior to implementingthe first failsafe action, receiving a denial to the request to extendthe time interval for an antidote message.
 18. The electronic device ofclaim 11, wherein the method further comprises: prior to implementingthe first failsafe action, receiving a command to extend a time intervalfor an antidote message.
 19. The electronic device of claim 11, whereinthe method further comprises: determining that a third antidote messagewas not received within a third time interval; and implementing a secondfailsafe action in response to determining that the third antidotemessage was not received where the second failsafe action is differentthan the first failsafe action and wherein the conditions defined in thefirst antidote message further comprise at least one of matching aspecific serial number pattern, a device type identification, a specificdevice status, an operation currently being executed, current memorycontent, and a CPU register value.
 20. A system, comprising: a firstelectronic device; and a second electronic device comprising: aprocessor; and a non-transitory computer-readable medium comprisingprocessor executable instructions, that when executed by the processor,performs a method, the method comprising: receiving a first antidotemessage within a first time interval at the second electronic device atthe electronic device where the first antidote message is transmittedfrom an external second device; validating the received first antidotemessage based on (i) decoding the antidote message and (ii) determiningif conditions defined in the first antidote message are met, wherein theconditions comprise at least one of matching (i) a voltage associatedwith the electronic device, (ii) an electronic current associated withthe electronic device, (iii) a temperature associated with theelectronic device, (iv) a temperature associated with the externalsecond device, (v) an operation currently being executed, (vi)symmetric-key cryptography, (vii) public-key cryptography, (viii) aspecific serial number pattern, (ix) a device type identification, (x) aspecific device status, (xi) current memory content, (xii) a CPUregister value, (xiii) a current state of the electronic device, (xiv) atimestamp, (xv) a message id, and (xvi) external environmental data;continuing normal operation of the electronic device based on receivingthe first antidote message and the validation; waiting for reception ofa second antidote message from the external second device within asecond time interval; determining that the second antidote message wasnot received from the external second device within the second timeinterval; transmitting a request to extend the second time interval forthe second antidote message; receiving a denial to the request to extendthe time interval for the second antidote message; and implementing, atthe electronic device, a first failsafe action at the first electronicdevice in response to determining that the second antidote message wasnot received and the denial from the external second device.