Method to control access between network endpoints based on...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C726S016000

Reexamination Certificate

active

07904727

ABSTRACT:
Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.

REFERENCES:
patent: 5465299 (1995-11-01), Matsumoto et al.
patent: 5919257 (1999-07-01), Trostle
patent: 6157721 (2000-12-01), Shear et al.
patent: 6209091 (2001-03-01), Sudia et al.
patent: 6289460 (2001-09-01), Hajmiragha
patent: 6327652 (2001-12-01), England et al.
patent: 6393420 (2002-05-01), Peters
patent: 6470448 (2002-10-01), Kuroda et al.
patent: 6609200 (2003-08-01), Anderson et al.
patent: 6823454 (2004-11-01), Hind et al.
patent: 6826690 (2004-11-01), Hind et al.
patent: 6976087 (2005-12-01), Westfall et al.
patent: 6978366 (2005-12-01), Ignatchenko et al.
patent: 7003578 (2006-02-01), Kanada et al.
patent: 7024548 (2006-04-01), O'Toole, Jr.
patent: 7100046 (2006-08-01), Balaz et al.
patent: 7178030 (2007-02-01), Scheidt et al.
patent: 7268906 (2007-09-01), Ruhl et al.
patent: 7272719 (2007-09-01), Bleckmann et al.
patent: 7457951 (2008-11-01), Proudler et al.
patent: 7461249 (2008-12-01), Pearson et al.
patent: 2002/0095589 (2002-07-01), Keech
patent: 2002/0144149 (2002-10-01), Hanna et al.
patent: 2002/0150241 (2002-10-01), Scheidt et al.
patent: 2003/0014755 (2003-01-01), Williams
patent: 2003/0028585 (2003-02-01), Yeager et al.
patent: 2003/0097581 (2003-05-01), Zimmer
patent: 2003/0177394 (2003-09-01), Dozortsev
patent: 2004/0205340 (2004-10-01), Shimbo et al.
patent: 2005/0033987 (2005-02-01), Yan et al.
patent: 2005/0132122 (2005-06-01), Rozas
patent: 2005/0138417 (2005-06-01), McNerney et al.
patent: 2005/0163317 (2005-07-01), Angelo et al.
patent: 2005/0184576 (2005-08-01), Gray et al.
patent: 2005/0278775 (2005-12-01), Ross
patent: 2006/0005254 (2006-01-01), Ross
patent: 2006/0048228 (2006-03-01), Takemori et al.
patent: 2006/0074600 (2006-04-01), Sastry et al.
patent: 2006/0173788 (2006-08-01), Nath Pandya et al.
patent: 2007/0050622 (2007-03-01), Rager et al.
patent: 2007/0130566 (2007-06-01), van Rietschote et al.
patent: 2007/0143629 (2007-06-01), Hardjono et al.
patent: 2007/0174429 (2007-07-01), Mazzaferri et al.
patent: 2007/0180495 (2007-08-01), Hardjono et al.
patent: 2008/0092235 (2008-04-01), Comlekoglu
patent: 2008/0256363 (2008-10-01), Balacheff et al.
patent: 2009/0089860 (2009-04-01), Forrester et al.
patent: WO2006/058313 (2006-06-01), None
patent: WO2008/024135 (2008-02-01), None
patent: WO/2009/018366 (2008-02-01), None
patent: WO/2008/030629 (2008-03-01), None
Liu et al., “A Dynamic Trust Model for Mobile Ad Hoc Networks”, May 26, 2004, IEEE, Proceedings of the 10th IEEE Internation Workshop on Future Trends of Distributed Computing Systems (FTDCS'04), pp. 80-85.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method to control access between network endpoints based on... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method to control access between network endpoints based on..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to control access between network endpoints based on... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2714303

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.