METHODS AND APPARATUS FOR MANAGING NETWORK TRAFFIC
First Claim
1. A method of authenticating an assertion by a source in an environment of distributed control, comprising:
- receiving a notification of the assertion by the source;
determining an entity responsible for maintaining an authenticated list of assertions by the source based on a network address associated with the source and a first trusted public record;
determining an assertion authenticator for the entity based on a second trusted public record;
determining one or more authenticated assertions of the source from the assertion authenticator; and
authenticating the assertion based on the determined one or more authenticated assertions.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus, and computer readable storage medium for authenticating assertions of a source are disclosed. In one aspect, a method for authenticating an assertion of a source in an environment of distributed control include receiving a notification of the assertion; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, determining an assertion authenticator for the entity based on a second trusted public record, determining one or more assertions of the source from the assertion authenticator, and authenticating the assertion based on the determined one or more assertions.
12 Citations
20 Claims
-
1. A method of authenticating an assertion by a source in an environment of distributed control, comprising:
-
receiving a notification of the assertion by the source; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a network address associated with the source and a first trusted public record; determining an assertion authenticator for the entity based on a second trusted public record; determining one or more authenticated assertions of the source from the assertion authenticator; and authenticating the assertion based on the determined one or more authenticated assertions. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for authenticating an assertion by a source, comprising:
-
one or more processors; and one or more memories, operably connected to the processors, wherein the one or more processors are configured to fetch instructions from the one or more memories, and the one or more memories are configured to store; a notification module configured to receive a notification of the assertion by the source, an entity determining module, configured to determine an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, an assertion authenticator determination module, configured to determine an assertion authenticator for the entity based on a second trusted public record, an assertion determining module, configured to obtain authenticated assertions of the source from the assertion authenticator, and an assertion authentication module, configured to authenticate the assertion based on the obtained assertions. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable medium comprising instructions that when executed by a processor cause it to perform a method for authenticating an assertion by a source, the method comprising:
-
receiving a notification of the assertion by the source; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record; determining an assertion authenticator for the entity based on a second trusted public record; determining one or more authenticated assertions of the source from the assertion authenticator; and authenticating the assertion based on the determined one or more authenticated assertions. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification