Volume mount authentication
First Claim
1. A method of determining a level of trust for a computer media comprising the steps of:
- a) obtaining metadata associated with said media;
b) obtaining calculation steps, c) applying said calculation steps to said metadata, thereby producing a trust factor score;
d) comparing said trust factor score with a scoring matrix, thereby producing a level of trust zone value; and
e) selecting a further action based upon said level of trust zone value.
11 Assignments
0 Petitions
Accused Products
Abstract
There is a variety of media that may be inserted into a reading or writing device, such as CD'"'"'s, USB drives, floppy disks, memory sticks, and many other devices. Media is inserted into a media reading or writing device that is in communication with a computer or network device. Upon insertion of the media, a number of metadata regarding that media is available to the computer. The trustworthy calculator is typically a plug-in software module that processes each piece of volume metadata and applies a weighed score, resulting in a Trustworthy Factor. A scoring matrix denotes ranges of values of the Trustworthy Factor into a Level of Trust Zone. Based on the Level of Trust Zone, appropriate action handlers may direct the computer to disallow the mounting of the media, may require specific authentication action to take place prior to allowing a mount of the media, or may indicate that the media may be mounted without further authentication. Upon completion of the execution of the action handlers, a decision to allow or disallow the mount is made.
-
Citations
59 Claims
-
1. A method of determining a level of trust for a computer media comprising the steps of:
-
a) obtaining metadata associated with said media;
b) obtaining calculation steps, c) applying said calculation steps to said metadata, thereby producing a trust factor score;
d) comparing said trust factor score with a scoring matrix, thereby producing a level of trust zone value; and
e) selecting a further action based upon said level of trust zone value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus for determining volume mount authentication of a media comprising:
-
a) means to obtain metadata associated with said media;
b) means to obtain calculation steps;
c) means to apply said calculation steps to said metadata, thereby producing a trust factor score;
d) means to compare said trust factor score with a scoring matrix, thereby producing a level of trust zone value; and
e) means to signal a further action based upon said level of trust zone value. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for authenticating computer media for communication with a computing device, comprising the steps of:
-
a) detecting a media volume mount point;
b) deabstracting a logical address of said media volume mount point into a physical disk partition address;
c) deabstracting said physical disk partition address into a physical storage device address;
d) receiving a plurality of metadata elements from data structures associated with one or more components from the list comprising;
said computer media, said physical storage device address, said physical disk partition address, a data communications channel, and said media volume mount point;
e) loading a trustworthy factor calculator wherein said trustworthy factor calculator comprises calculation steps producing score values and maximum possible score values associated with said metadata elements;
f) initializing said trustworthy factor calculator with a matrix of weighing factors associated with said plurality of metadata elements;
g) accumulating a raw score based on said score values for said plurality of metadata elements, wherein each score value used in said accumulation of said raw score is adjusted by said associated weighing factors, accumulating an overall maximum possible score for said maximum possible score values, wherein each maximum possible score value used in said accumulation of said overall maximum score is adjusted by said associated weighing factors, normalizing said raw score with said overall maximum score, whereby a trustworthy factor score is produced;
h) initializing said trustworthy factor calculator with a scoring matrix having discrete level of trust zone values associated with trustworthy factor scores;
i) comparing said trustworthy factor score with said scoring matrix, whereby a level of trust zone value is produced;
j) executing at least one zone action handler based on said level of trust zone value, said zone action handler returning at least one zone action handler response; and
k) determining whether said volume mount point authentication should be permitted or denied based on the result of said zone action handlers response. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
Specification