Configuring Security Mechanisms Utilizing A Trust System
First Claim
Patent Images
1. A method comprising:
- receiving a request at a protected device to communicate with a second device, the request including information associated with the second device;
accessing a list of trusted devices; and
allowing communication between the protected device and the second device if the information associated with the second device correlates to information on the list of trusted devices.
2 Assignments
0 Petitions
Accused Products
Abstract
Implementations of configuring security mechanisms utilizing a trust system are described. In one implementation, a request to communicate is received at a protected device. Before permission to communicate can be granted, a list of trusted devices is accessed. If information, such as an identity or a secret, associated with the device sending the request to communicate correlates to information found on the list of trusted devices, then communication can be allowed. Otherwise, communication between the device and the protected device can be denied.
74 Citations
20 Claims
-
1. A method comprising:
-
receiving a request at a protected device to communicate with a second device, the request including information associated with the second device; accessing a list of trusted devices; and allowing communication between the protected device and the second device if the information associated with the second device correlates to information on the list of trusted devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium having a set of computer-readable instructions residing thereon that, when executed, perform acts comprising:
-
accepting a request from a requesting device to communicate with a protected device; accepting information associated with the requesting device from the requesting device; querying a list of trusted devices for the information associated with the requesting device; establishing a path of communication between the requesting device and the protected device if the information associated with the requesting device correlates to information on the list of trusted devices. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computing-based device comprising:
-
a processor; a memory including a communication security module, the communication security module comprising; a communication request module configured to receive a request from a requesting device to communicate with the computing-based device, the requesting device having associated information; a communication enforcement module configured to access a list of trusted devices and allow communication between the computing-based device and the requesting device if the associated information correlates to information on the list of trusted devices. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification