发明名称 Systems and methods for enterprise security with collaborative peer to peer architecture
摘要 Systems and methods authenticate a device to operate within an enterprise system with an enterprise policy. An agent, installed on the device, analyzes the device to determine profile information of the device. The determined profile information is sent to a type 2 super peer that verifies whether the profile information conforms to the enterprise policy. If the profile information conforms to the enterprise policy, an agent trust credential is generated, within the type 2 super peer, for the agent, based upon the profile information, and issued to the agent. Authenticity of the device is verified based upon the agent trust credential. If the device is authenticated, communications with the device are permitted. If the device is not authenticated, communications with the device is prevented. In another embodiment, a method restores a device to conform to a system policy. A snapshot of critical components of the device is taken while the device is in compliance with the system policy. The critical components are monitored to identify critical components that differ from the critical components of the snapshot. If differing critical components are detected, the device is restored to conform with system policy by replacing differing critical components based upon the snapshot.
申请公布号 US8239917(B2) 申请公布日期 2012.08.07
申请号 US20070928256 申请日期 2007.10.30
申请人 HAMMOND, II FRANK J.;RICOTTA, JR. FRANK J.;DYKSTRA HANS MICHAEL;WILLIAMS BLAKE ANDREW;CARLANDER STEVEN JAMES;WILLIAMS GERBER SARAH;ENTERPRISE INFORMATION MANAGEMENT, INC. 发明人 HAMMOND, II FRANK J.;RICOTTA, JR. FRANK J.;DYKSTRA HANS MICHAEL;WILLIAMS BLAKE ANDREW;CARLANDER STEVEN JAMES;WILLIAMS GERBER SARAH
分类号 G06F17/00;G06F7/02;G06F15/16;H04L29/06 主分类号 G06F17/00
代理机构 代理人
主权项
地址
您可能感兴趣的专利