DEVICES, SYSTEMS, AND METHODS FOR MONITORING AND ASSERTING TRUST LEVEL USING PERSISTENT TRUST LOG
First Claim
Patent Images
1. A computing device having a trust level, the computing device comprising:
- a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing the trust level of the computing device; and
a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing a trust level of the computing device, and a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log.
70 Citations
29 Claims
-
1. A computing device having a trust level, the computing device comprising:
-
a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing the trust level of the computing device; and a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for asserting a trust level of a computing device, the method comprising:
-
receiving a trust assessment request originating from an external service; generating a trust assessment using a security engine of the computing device by analyzing data stored in a persistent trust log; and transmitting the trust assessment to the external service originating the trust assessment request. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. One or more machine readable storage media comprising a plurality of instructions stored thereon that, in response to being executed, result in a computing device:
-
receiving a trust assessment request originating from an external service; generating a trust assessment using a security engine of the computing device by analyzing data stored in a persistent trust log; and transmitting the trust assessment to the external service originating the trust assessment request. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
Specification