Trusted computing environment
First Claim
Patent Images
1. A method of operating a trusted computing system, the method comprising an assessor receiving a report from, and pertaining to the trustworthiness of, a first computing device, and the assessor updating the trust policy of a second computing device in accordance with the report.
3 Assignments
0 Petitions
Accused Products
Abstract
A trusted computing environment 100, wherein each computing device 112 to 118 holds a policy specifying the degree to which it can trust the other devices in the environment 100. The policies are updated by an assessor 110 which receives reports from trusted components 120 in the computing devices 112 to 118 which identify the trustworthiness of the computing devices 112 to 118.
-
Citations
18 Claims
- 1. A method of operating a trusted computing system, the method comprising an assessor receiving a report from, and pertaining to the trustworthiness of, a first computing device, and the assessor updating the trust policy of a second computing device in accordance with the report.
-
9. A method of operating a trusted computing system in which a first computing device has a trusted component which issues a report pertaining to the trustworthiness of the first computing device wherein a trust policy controller receives said report from the trusted component and updates the trust policy of a second computing device in accordance with said report.
-
10. A method of operating a trusted computing system comprising multiple computing devices wherein a trust policy controller determines the trust policy for each of said computing devices in accordance with the trustworthiness of other of said multiple computing devices as determined from reports received by the controller pertaining to the trustworthiness of each computing device.
- 11. An assessor for controlling a trusted computing system, the assessor comprising a receiver for receiving a report from, and pertaining to the trustworthiness of, a first computing device, an updater for updating the trust policy of a second computing device in accordance with the report, and a transmitter for transmitting the updated policy to the second computing device.
-
16. A system comprising an assessor for controlling a trusted computing system, the assessor comprising a receiver for receiving a report from, and pertaining to the trustworthiness of, a first computing device, an updater for updating the trust policy of a second computing device in accordance with the report, and a transmitter for transmitting the updated policy to the second computing device, and the system further comprising first and second computing devices, wherein at least the first computing device comprises a reporter for sending a trustworthiness report to the assessor and at least the second computing device comprises a memory maintaining a trust policy such that the trust policy is modifiable by the transmitter.
-
18. A system comprising multiple computing devices and a trust policy controller which serves to determine the trust policy of said computing devices;
- each of said computing devices having associated with it a trust policy memory to store a trust policy for that computing device, and a trusted component which issues a report pertaining to the trustworthiness of that computing device;
wherein the controller receives reports from the trust components and updates the trust policy in the trust policy memory of each computing device in accordance with the trustworthiness of other of said multiple computing devices as determined from said reports.
- each of said computing devices having associated with it a trust policy memory to store a trust policy for that computing device, and a trusted component which issues a report pertaining to the trustworthiness of that computing device;
Specification