System, Method and Computer Program Product for Administering Trust Dependent Functional Control over a Portable Endpoint Security Device
First Claim
1. A system for administering trust dependent functional control over a portable endpoint security device comprising:
- a trust enforcement policy including one or more predefined trust dependent characteristics for which the trust dependent functional control is to be administered;
a reconnoitering application including instructions executable by a processor to;
reconnoiter one or more trust dependent characteristics associated with a host processing unit;
determine a relative trusted state of the host processing unit in dependence on the trust enforcement policy and the trust dependent characteristics reconnoitered from the host processing unit; and
,administer the trust dependent functional control over the portable endpoint security device in dependence on the determined relative trusted state of the host processing unit.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method and computer program product for administering trust dependent functional control over a portable endpoint security device (PEPS). A reconnoitering application in conjunction with a trust enforcement policy determines a relative trusted state of the host processing unit and administers trust dependent functional control over the PEPS in dependence on one or more trust dependent characteristics reconnoitered from the host processing unit. The trust dependent characteristics reconnoitered from the host processing unit may be location dependent, context dependent, hardware configuration dependent and logical state dependent.
-
Citations
51 Claims
-
1. A system for administering trust dependent functional control over a portable endpoint security device comprising:
-
a trust enforcement policy including one or more predefined trust dependent characteristics for which the trust dependent functional control is to be administered; a reconnoitering application including instructions executable by a processor to; reconnoiter one or more trust dependent characteristics associated with a host processing unit; determine a relative trusted state of the host processing unit in dependence on the trust enforcement policy and the trust dependent characteristics reconnoitered from the host processing unit; and
,administer the trust dependent functional control over the portable endpoint security device in dependence on the determined relative trusted state of the host processing unit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for administering trust dependent functional control over a portable endpoint security device comprising a trust enforcement policy including one or more predefined trust dependent characteristics for which the trust dependent functional control is to be administered coupled to a reconnoitering application including instructions executable by a processor for;
-
reconnoitering one or more trust dependent characteristics associated with a host processing unit; determining a relative trusted state of the host processing unit in dependence on the trust enforcement policy and the trust dependent characteristics reconnoitered from the host processing unit; and
,administering the trust dependent functional control over the portable endpoint security device in dependence on the determined relative trusted state of the host processing unit. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer program product for administering trust dependent functional control over a portable endpoint security device embodied in a tangible form comprising instructions executable by a processor for;
-
reconnoitering one or more trust dependent characteristics associated with a host processing unit; determining a relative trusted state of the host processing unit in dependence on a trust enforcement policy and the one or more trust dependent characteristics reconnoitered from the host processing unit; and
,administering trust dependent functional control over the portable endpoint security device in dependence on the determined relative trusted state of the host processing unit. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
Specification