METHOD AND APPARATUS FOR MONITORING AND ANALYZING DEGREE OF TRUST AND INFORMATION ASSURANCE ATTRIBUTES INFORMATION IN A DATA PROVIDENCE ARCHITECTURE WORKFLOW
First Claim
1. A method for monitoring and analyzing degree of trust and information assurance attributes information in a data providence architecture workflow, comprising:
- receiving a message having a data provenance wrapper, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment;
examining each data provenance record of the message and any attachments for discrepancies, wherein the examination of each data provenance record of the message and any attachments includes;
verifying signatures of senders of the message and any attachments;
calculating a hash value for the message and any attachments;
verifying that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments;
verifying the timestamp of the message and any attachments; and
verifying information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability;
identifying any discrepancies in the examination of each data provenance record of the message and any attachments;
calculating a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments; and
presenting the degree of trust and information assurance attributes information to the user on a display.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus that monitors and analyzes degree of trust and information assurance attributes information in a data providence architecture workflow is disclosed. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, and presenting the degree of trust and information assurance attributes information to the user on a display.
-
Citations
21 Claims
-
1. A method for monitoring and analyzing degree of trust and information assurance attributes information in a data providence architecture workflow, comprising:
-
receiving a message having a data provenance wrapper, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment; examining each data provenance record of the message and any attachments for discrepancies, wherein the examination of each data provenance record of the message and any attachments includes; verifying signatures of senders of the message and any attachments; calculating a hash value for the message and any attachments; verifying that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments; verifying the timestamp of the message and any attachments; and verifying information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability; identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments; and presenting the degree of trust and information assurance attributes information to the user on a display. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus that monitors and analyzes degree of trust and information assurance attributes information in a data providence architecture workflow, comprising:
-
a display that presents information to a user; a communication interface that facilitates the sending and receiving of messages; and a data provenance information analysis unit that receives a message through the communication interface having a data provenance wrapper, examines each data provenance record of the message and any attachments for discrepancies, identifies any discrepancies in the examination of each data provenance record of the message and any attachments, calculates a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments, and presents the degree of trust and information assurance attributes information to the user on the display, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment, and wherein in the examination of each data provenance record of the message and any attachments, the data provenance information analysis unit verifies signatures of senders of the message and any attachments, calculates a hash value for the message and any attachments, verifies that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments, verifies the timestamp of the message and any attachments, and verifies information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium storing instructions for controlling a computing device for monitoring and analyzing degree of trust and information assurance attributes information in a data providence architecture workflow, the instructions comprising:
-
receiving a message having a data provenance wrapper, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment; examining each data provenance record of the message and any attachments for discrepancies, wherein the examination of each data provenance record of the message and any attachments includes; verifying signatures of senders of the message and any attachments; calculating a hash value for the message and any attachments; verifying that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments; verifying the timestamp of the message and any attachments; and verifying information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability; identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments; and presenting the degree of trust and information assurance attributes information to the user on a display. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification