Configuring security mechanisms utilizing a trust system

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C726S011000

Reexamination Certificate

active

07853992

ABSTRACT:
Implementations of configuring security mechanisms utilizing a trust system are described. In one implementation, a request to communicate is received at a protected device. Before permission to communicate can be granted, a list of trusted devices is accessed. If information, such as an identity or a secret, associated with the device sending the request to communicate correlates to information found on the list of trusted devices, then communication can be allowed. Otherwise, communication between the device and the protected device can be denied.

REFERENCES:
patent: 5204961 (1993-04-01), Barlow
patent: 5968176 (1999-10-01), Nessett et al.
patent: 6304974 (2001-10-01), Samar
patent: 6473791 (2002-10-01), Al-Ghosein et al.
patent: 6968377 (2005-11-01), Gleichauf et al.
patent: 7069438 (2006-06-01), Balabine et al.
patent: 7076655 (2006-07-01), Griffin et al.
patent: 7096498 (2006-08-01), Judge
patent: 7194004 (2007-03-01), Thomsen
patent: 2002/0053032 (2002-05-01), Dowling et al.
patent: 2003/0167405 (2003-09-01), Freund et al.
patent: 2004/0210767 (2004-10-01), Sinclair et al.
patent: 2005/0039051 (2005-02-01), Erofeev
patent: 2006/0143699 (2006-06-01), Nagata et al.
The security of cloud computing system enabled by trusted computing technology; Shen, Zhidong; Tong, Qiang; Signal Processing Systems (ICSPS), 2010 2nd International Conference on vol. 2; Publication Year: 2010 , pp. V2-11-V2-15.
Towards Self-Manageable Cloud Services; Brandic, I.; Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International vol. 2; Publication Year: 2009 , pp. 128-133.
Cloud Computing: Issues and Challenges; Dillon, T.; Chen Wu; Chang, E.; Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on Publication Year: 2010 , pp. 27-33.
Almenarez, et al., “PTM: A Pervasive Trust Management Model for Dynamic Open Environments”, available at least as early as Apr. 12, 2007, at <<http://www.pspt.org/camera-ready/p2-almenarez-ptm.pdf>>, pp. 1-8.
Kagal, et al., “Trust-Based Security in Pervasive Computing Environments”, available at least as early as Apr. 12, 2007, at <<http://ebiquity.umbc.edu/—file—directory—/papers/73.pdf>>, Dec. 2001, pp. 2-5.
Saadi, et al., “(Dis)trust Certification Model for Large Access in a Pervasive Environment”, available at least as early as Apr. 12, 2007, <<http://liris.cnrs.fr/publis/pdf/Brunie-2005—liris2288.pdf?id=2288>>, Troubador Publishing Ltd, 2005, pp. 289-299.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Configuring security mechanisms utilizing a trust system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Configuring security mechanisms utilizing a trust system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Configuring security mechanisms utilizing a trust system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4155323

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.