A trusted computing environment 100, wherein each computing device 112 to 118 holds a policy specifying the degree to which it can trust the other devices in the environment 100. The policies are updated by an assessor 110 which receives reports from trusted components 120 in the computing devices 1
A trusted computing environment 100, wherein each computing device 112 to 118 holds a policy specifying the degree to which it can trust the other devices in the environment 100. The policies are updated by an assessor 110 which receives reports from trusted components 120 in the computing devices 112 to 118 which identify the trustworthiness of the computing devices 112 to 118.
대표청구항▼
The invention claimed is: 1. A method of operating a trusted computing system comprising a plurality of computing devices on a network, the method comprising: an assessor computing device receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device; an
The invention claimed is: 1. A method of operating a trusted computing system comprising a plurality of computing devices on a network, the method comprising: an assessor computing device receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device; and the assessor computing device updating via the network the trust policy of a second computing device in accordance with the report. 2. A method according to claim 1, wherein the assessor computing device updates via the network the trust policies of multiple computing devices in accordance with the report. 3. A method according to claim 1, wherein the assessor computing device updates via the network policies by assessing the trustworthiness of the first computing device on the basis of information about the first computing device in the report. 4. A method according to claim 1, wherein the assessor computing device updates via the network policies on the basis of an assessment of the trustworthiness of the first computing device contained in the report. 5. A method according to claim 1, wherein the assessor computing device requests via the network the first computing device to make the report. 6. A method according to claim 1, wherein the first computing device is caused to report by being started-up or reset, or by an undesirable event occurring. 7. A method according to claim 1, wherein the first computing device is caused to report periodically. 8. A method according to claim 1 in which the second computing device authenticates the trust policy update issued by the assessor computing device before accepting it. 9. A method of operating a trusted computing system comprising a plurality of computing devices on a network, in which a first computing device has a trusted component which issues a report pertaining to the trustworthiness of the first computing device wherein a trust policy controller receives said report via the network from the trusted component and updates via the network the trust policy of a second computing device in accordance with said report. 10. A method of operating a trusted computing system comprising multiple computing devices on a network, the method comprising: a trust policy controller receiving reports via the network pertaining to the trustworthiness of each said computing device; and the trust policy controller determining the trust policy for each of said computing devices in accordance with the trustworthiness of other of said multiple computing devices as determined from said received reports. 11. An assessor computing device for controlling a trusted computing system comprising multiple computing devices on a network, the assessor comprising a receiver for receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device, an updater for updating the trust policy of a second computing device in accordance with the report, and a transmitter for transmitting the updated policy to the second computing device via the network. 12. An assessor computing device according to claim 11, wherein the updater is arranged to update the trust policies of multiple computing devices in accordance with the report and the transmitter is arranged to transmit the updated policies to the multiple computing devices via the network. 13. An assessor computing device according to claim 11, wherein the updater updates policies by assessing the trustworthiness of the first computing device on the basis of information about the first computing device in the report. 14. An assessor computing device according to claim 11, wherein the updater updates policies on the basis of an assessment of the trustworthiness of the first computing device contained in the report. 15. An assessor computing device according to claim 11 further comprising a requestor, for requesting the report from the first computing device. 16. A system, comprising: an assessor computing device for controlling a trusted computing system comprising multiple computing devices on a network, the assessor comprising a receiver for receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device, an updater for updating the trust policy of a second computing device in accordance with the report, and a transmitter for transmitting the updated policy to the second computing device, and the system further comprising first and second computing devices, wherein at least the first computing device comprises a reporter for sending via the network a trustworthiness report to the assessor computing device and at least the second computing device comprises a memory maintaining a trust policy such that the trust policy is modifiable by the transmitter. 17. A system as claimed in claim 16 in which the reporter comprises a trusted component associated with the first computing device. 18. A system, comprising: multiple computing devices on a network, and a trust policy controller which serves to determine the trust policy of said computing devices; each of said computing devices having associated with it a trust policy memory to store a trust policy for that computing device, and a trusted component which issues a report pertaining to the trustworthiness of that computing device; wherein the controller receives via the network reports from the trust components and updates via the network the trust policy in the trust policy memory of each computing device in accordance with the trustworthiness of other of said multiple computing devices as determined from said reports.
Saunders Randy (Upland CA) Francisco Emmanuel C. (Covina CA), Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems.
Arnold William C. (Mahopac NY) Chess David M. (Mohegan Lake NY) Kephart Jeffrey O. (Yorktown Heights NY) White Steven R. (New York NY), Automatic immune system for computers and computer networks.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
Brett B. Stewart ; James W. Thompson, Geographic-based communication service system with more precise determination of a user's known geographic location.
Case, T. Scott; Walker, Jay S.; Tedesco, Daniel E., Method and apparatus for detecting and deterring the submission of similar offers in a commerce system.
Takahashi Fumiaki,JPX ; Takiguchi Hideo,JPX, Method and apparatus for extracting a keyword from scheduling data using the keyword for searching the schedule data fil.
Bellare Mihir M. (New York NY) Rogaway Phillip W. (Austin TX), Method and apparatus for three-party entity authentication and key distribution using message authentication codes.
Richton, Robert Ellis, Method and apparatus for wireless telecommunications system that provides location-based information delivery to a wireless mobile unit.
Pfeffer, Darrell Anthony; Wallace, Craig Stuart, Method and apparatus in a wireless communication system for selectively providing information specific to a location.
Takashima Youichi (Kanagawaken JPX) Ishii Shinji (Kanagawaken JPX) Yamanaka Kiyoshi (Kanagawaken JPX), Method and system for digital information protection.
Sampath Srivats ; Balasubramaniam Chandrasekar ; Lingarkar Ravi ; Katchapalayam Babu ; Kannan Ravi, Method and system for securing, managing or optimizing a personal computer.
Sandstrom Brent B. (942 Copperkey Ct. Gilbert AZ 85233) Ewert Ernest R. (261 W. Verano Pl. Gilbert AZ 85233) Reisch Robert D. (2036 E. Clipper Cir. Gilbert AZ 85234), Method for securely storing electronic records.
England, Paul; Peinado, Marcus; Sankaranarayan, Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
Rose Anthony M. (66 Drumalbyn Road Bellevue Hill ; Sydney AUX 2023), Securing a computer against undesired write operations to or read operations from a mass storage device.
Tajalli Homayoon (Ellicott City MD) Badger Mark L. (Rockville MD) Dalva David I. (Rockville MD) Walker Stephen T. (Glenwood MD), System and method for controlling the use of a computer.
Miklos Ajtai ; Randal Chilton Burns ; Ronald Fagin ; Larry Joseph Stockmeyer, System and method for differential compression of data from a plurality of binary sources.
Meadows, Vernon; Harper, Michael S., System and method for monitoring the location of individuals via the world wide web using a wireless communications network.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Blackledge ; Jr. John W. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Moeller Dennis L. (Boca Raton FL) Newman Palmer E. (Boca Raton FL) Zubay Kenneth J. P. (Boca Raton FL), Trusted personal computer system with identification.
Grobman, Steven L.; Sengupta, Uttam K.; Permeh, Ryan, Devices, systems, and methods for monitoring and asserting trust level using persistent trust log.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.