Method to control access between network endpoints based on...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C726S016000

Reexamination Certificate

active

07487358

ABSTRACT:
Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.

REFERENCES:
patent: 5919257 (1999-07-01), Trostle
patent: 6157721 (2000-12-01), Shear et al.
patent: 6209091 (2001-03-01), Sudia et al.
patent: 6327652 (2001-12-01), England et al.
patent: 6823454 (2004-11-01), Hind et al.
patent: 6826690 (2004-11-01), Hind et al.
patent: 6976087 (2005-12-01), Westfall et al.
patent: 7003578 (2006-02-01), Kanada et al.
patent: 7024548 (2006-04-01), O'Toole, Jr.
patent: 7100046 (2006-08-01), Balaz et al.
patent: 7272719 (2007-09-01), Bleckmann et al.
patent: 2002/0144149 (2002-10-01), Hanna et al.
patent: 2003/0177394 (2003-09-01), Dozortsev
patent: 2005/0132122 (2005-06-01), Rozas
patent: 2005/0138417 (2005-06-01), McNerney et al.
patent: 2005/0184576 (2005-08-01), Gray et al.
patent: 2007/0050622 (2007-03-01), Rager et al.
patent: 2006058313 (2006-01-01), None
patent: WO 2006/058313 (2006-02-01), None

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method to control access between network endpoints based on... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method to control access between network endpoints based on..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to control access between network endpoints based on... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4102211

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.