Method of and apparatus for ascertaining the status of a data processing environment
First Claim
Patent Images
1. a. A computing device including:
- a communication device and a data processor, wherein the computing device uses the communication device to establish communication with at least one device within a data processing system, and in which the data processor is arranged to identify a challenge from at least one trusted computing device to search for a generation identifier within the challenge, to apply response rules to the generation identifier to see if the challenge is still valid, and if it is not to disregard the challenge and if the challenge is valid to apply response rules to the challenge and, if a response indicated, to respond to the challenge in accordance with the rules.
3 Assignments
0 Petitions
Accused Products
Abstract
In order to facilitate a user'"'"'s ability to trust a computing environment, a trusted computing device (2) is arranged to challenge other devices in the computing environment and to record a log of the facilities available within the computing environment and an indication of whether those facilities are trustworthy. A new user (40) entering the computing environment can obtain the log from the trusted computing device in order to ascertain the status of the environment. Alternatively any device can hold data concerning platforms in its vicinity and its operation can be authenticated by the trusted device.
-
Citations
7 Claims
-
1. a. A computing device including:
- a communication device and a data processor, wherein the computing device uses the communication device to establish communication with at least one device within a data processing system, and in which the data processor is arranged to identify a challenge from at least one trusted computing device to search for a generation identifier within the challenge, to apply response rules to the generation identifier to see if the challenge is still valid, and if it is not to disregard the challenge and if the challenge is valid to apply response rules to the challenge and, if a response indicated, to respond to the challenge in accordance with the rules.
- View Dependent Claims (2)
-
3. A method of ascertaining the status of a data processing environment, comprising the following steps:
a trusted computing device challenges other devices within a data processing environment, keeps a record of responses made to the challenges and makes the record available, in which a challenge of the challenges generated by the trusted device includes a generation identifier such that any device receiving the challenge can examine the generation identifier in order to establish whether the challenge is directly received from the trusted computing device or whether it has been retransmitted. - View Dependent Claims (4, 5, 6)
-
7. a. A method of conducting a transaction in a data processing environment comprising a user device and al least a trusted computing device each having respective communication capabilities comprising:
- the trusted computing device keeps a record of computing devices that it has identified within the data processing environment;
b. and whereby the user device establishes communication with the trusted computing device; c. the trusted computing devices sends to the user device at least a portion of the record of computing devices within the data processing environment; d. and the user device analyses the record to establish what facilities the user device may access; e. wherein the user device further analyses the record in accordance with a set of security rules to determine what level of trust can be placed on the integrity of the data processing environment.
- the trusted computing device keeps a record of computing devices that it has identified within the data processing environment;
Specification