Network Security Using Trust Validation
First Claim
1. A method, comprising:
- receiving a communication session request from a requesting node, the communication session request being received via a network facilitating communication among a plurality of nodes;
accessing a plurality of trust level values associated with the requesting node, each of the plurality of trust level values being received from one of the plurality of nodes;
determining, based on a voting technique and the accessed trust level values associated with the requesting node, a validated trust level associated with the requesting node; and
determining, based on the validated trust level associated with the requesting node, whether to allow the communication session request received from the requesting node.
1 Assignment
0 Petitions
Accused Products
Abstract
In certain embodiments, a method includes receiving a communication session request from a requesting node. The communication session request is received via a network facilitating communication among a number of nodes. A number of trust level values associated with the requesting node are accessed. Each of the number of trust level values is received from one of the number of nodes. The method further includes determining, based on a voting technique and the accessed trust level values associated with the requesting node, a validated trust level associated with the requesting node. The method further includes determining, based on the validated trust level associated with the requesting node, whether to allow the communication session request received from the requesting node.
-
Citations
21 Claims
-
1. A method, comprising:
-
receiving a communication session request from a requesting node, the communication session request being received via a network facilitating communication among a plurality of nodes; accessing a plurality of trust level values associated with the requesting node, each of the plurality of trust level values being received from one of the plurality of nodes; determining, based on a voting technique and the accessed trust level values associated with the requesting node, a validated trust level associated with the requesting node; and determining, based on the validated trust level associated with the requesting node, whether to allow the communication session request received from the requesting node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21)
-
-
8. A system, comprising:
one or more processing units operable to; receive a communication session request from a requesting node, the communication session request being received via a network facilitating communication among a plurality of nodes; access a plurality of trust level values associated with the requesting node, each of the plurality of trust level values being received from one of the plurality of nodes; determining, based on a voting technique and the accessed trust level values associated with the requesting node, a validated trust level associated with the requesting node; and determine, based on the validated trust level associated with the requesting node, whether to allow the communication session request received from the requesting node.
-
15. A computer-readable medium encoded with software, the software operable when executed to perform operation comprising:
-
receiving a communication session request from a requesting node, the communication session request being received via a network facilitating communication among a plurality of nodes; accessing a plurality of trust level values associated with the requesting node, each of the plurality of trust level values being received from one of the plurality of nodes; determining, based on a voting technique and the accessed trust level values associated with the requesting node, a validated trust level associated with the requesting node; and determining, based on the validated trust level associated with the requesting node, whether to allow the communication session request received from the requesting node.
-
Specification