METHOD TO CONTROL ACCESS BETWEEN NETWORK ENDPOINTS BASED ON TRUST SCORES CALCULATED FROM INFORMATION SYSTEM COMPONENT ANALYSIS
摘要
Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.
申请公布号
WO2006058313(A3)
申请公布日期
2007.01.18
申请号
WO2005US43035
申请日期
2005.11.28
申请人
SIGNACERT, INC.;BLECKMANN, DAVID, MAURITS;STARNES, WILLIAM, WYATT;ANDERSON, BRADLEY, DOUGLAS
发明人
BLECKMANN, DAVID, MAURITS;STARNES, WILLIAM, WYATT;ANDERSON, BRADLEY, DOUGLAS