Method and System for Policy Enforcement in Trusted Ad Hoc Networks
First Claim
1. A non-transitory computer readable storage medium storing a set of instructions executable by a processor, the set of instructions being operable to:
- receive a request from a node to join a trusted ad hoc network;
authenticate the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network;
send, to the node, a verification that the trusted ad hoc network complies with the security policy; and
add the node to the trusted ad hoc network.
2 Assignments
0 Petitions
Accused Products
Abstract
A non-transitory computer-readable storage medium storing a set of instructions executable by a processor. The set of instructions is operable to receive a request from a node to join a trusted ad hoc network. The set of instructions is further operable to authenticate the node to join the trusted ad hoc network. The authentication is performed based on a verification that the node will comply with a security policy of the trusted ad hoc network. The set of instructions is further operable to send, to the node, a verification that the trusted ad hoc network complies with the security policy. The set of instructions is further operable to add the node to the trusted ad hoc network.
33 Citations
20 Claims
-
1. A non-transitory computer readable storage medium storing a set of instructions executable by a processor, the set of instructions being operable to:
-
receive a request from a node to join a trusted ad hoc network; authenticate the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network; send, to the node, a verification that the trusted ad hoc network complies with the security policy; and add the node to the trusted ad hoc network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11)
-
-
10. The non-transitory computer readable storage medium 9, wherein the selection is made based on a higher one of a hash value of the initial key of the trusted ad hoc network and a hash value of the key of the further trusted ad hoc network.
-
12. A method, comprising:
-
receiving a request from a node to join a trusted ad hoc network; authenticating the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network; sending, to the node, a verification that the trusted ad hoc network complies with the security policy; and adding the node to the trusted ad hoc network. - View Dependent Claims (13, 14, 15, 16, 17, 19)
-
-
18. The method of claim 176, wherein each of the plurality of security policies corresponds to an application executed by a plurality of nodes of the trusted ad hoc network.
-
20. A device, comprising:
-
a memory; and a processor configured to receive a request from a node to join a trusted ad hoc network of which the device is a member, the processor further configured to authenticate the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network, the processor further configured to send, to the node, a verification that the trusted ad hoc network complies with the security policy, the processor further configured to add the node to the trusted ad hoc network.
-
Specification