Managing supplied data
First Claim
1. A method of managing entropy data, the method comprising:
- receiving, at a computing device, entropy data supplied from an external data source,wherein the entropy data comprises random data that is non-deterministic in origin;
scoring, at the computing device, the entropy data to determine whether the entropy data meets or exceeds a predetermined policy score; and
developing, at the computing device, a reputation value of the data source based upon the scoring.
7 Assignments
0 Petitions
Accused Products
Abstract
In a computing system environment, a data recipient manages entropy data supplied from an external data source despite not knowing or being certain about their trustworthiness or if such varies over time. Features relate to scoring the data and determining whether it meets or exceeds a predetermined policy score. One or more initial or updated reputation values of the data source are contemplated and used for scoring. Logging of the scoring, reputation values or other matters is provided for historical purposes and to identify possible future corrective actions. Other embodiments contemplate enhancing the score of the entropy data. In some instances, use of less than all the data by the recipient occurs to increase attack-resistance. Whether such occurs or how much occurs remains substantially unbeknownst to all parties other than the data recipient. Still other embodiments contemplate computer-readable media.
15 Citations
25 Claims
-
1. A method of managing entropy data, the method comprising:
-
receiving, at a computing device, entropy data supplied from an external data source, wherein the entropy data comprises random data that is non-deterministic in origin; scoring, at the computing device, the entropy data to determine whether the entropy data meets or exceeds a predetermined policy score; and developing, at the computing device, a reputation value of the data source based upon the scoring. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of managing entropy data, the method comprising:
-
receiving, at a computing device, entropy data supplied from an external data source, wherein the entropy data comprises random data that is non-deterministic in origin; scoring, at the computing device, the entropy data to determine whether the entropy data meets or exceeds a predetermined policy score; developing, at the computing device, a reputation value of the data source based upon the scoring; and logging, at the computing device, the scoring and the reputation value. - View Dependent Claims (7, 8)
-
-
9. A method of managing entropy data, the method comprising:
-
receiving, at a computing device, multiple instances of entropy data supplied from an external data source, wherein the entropy data comprises random data that is non-deterministic in origin; scoring, at the computing device, the multiple instances of entropy data to determine whether the multiple instances of entropy data meet or exceed a predetermined policy score; logging, at the computing device, the multiple instances of the scoring; developing, at the computing device, one or more reputation values of the external data source based upon the logged scoring; and using, at the computing device, the one or more reputation values of the external data source during one or more of the multiple instances of performing the scoring.
-
-
10. In a computing system environment, a method of managing data, comprising:
-
receiving, at a computing device, entropy data supplied from an external data source, wherein the entropy data comprises random data that is non-deterministic in origin; scoring, at the computing device, the entropy data to determine whether the entropy data meets or exceeds a predetermined policy score; selecting, at the computing device, only certain of the entropy data for use in an intended application requiring entropy data; and developing, at the computing device, a reputation value of the external data source based on the scoring. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory computer-readable medium having computer-executable instructions for managing supplied entropy data in a computing system environment, comprising:
-
a first component for receiving the supplied entropy data, wherein the entropy data comprises random data that is non-deterministic in origin; a second component for scoring the supplied entropy data; a third component for determining whether the supplied entropy data meets or exceeds a predetermined policy score; and a fourth component for utilizing a reputation value of an external data source supplying the entropy data with the second component for the scoring. - View Dependent Claims (15, 16, 17)
-
-
18. A method of managing a plurality of random bits of ones and zeros, comprising;
-
receiving, at a computing device and from an external data source, the plurality of random bits of ones and zeros, wherein the plurality of bits of ones and zeros comprises random data that is non-deterministic in origin; unbiasing, at the computing device, the supplied plurality of random bits to obtain a substantially equal number of one and zero bits; randomly selecting, at the computing device, bits of the substantially equal number of one and zero bits; discarding, at the computing device, all other bits of the substantially equal number of one and zero bits not randomly selected; and determining, at the computing device, a reputation value of the data source. - View Dependent Claims (19, 20)
-
-
21. A method of managing entropy data, the method comprising:
-
receiving, at a computing device, entropy data supplied from an external data source, wherein the entropy data comprises random data that is non-deterministic in origin; scoring, at the computing device, the entropy data to determine whether the entropy data meets or exceeds a predetermined policy score; developing, at the computing device, a reputation value of the data source based upon the scoring; receiving, at the computing device, subsequent entropy data from the data source and performing subsequent scoring of the subsequent entropy data, the performing the subsequent scoring using the developed reputation value; for a later intended application requiring entropy data, selecting, at the computing device, only certain of the supplied or subsequent entropy data for use in the intended application; and discarding, at the computing device, all other entropy data not found in the selected certain of the supplied or subsequent entropy data, the act of the discarding or the amount of the discarding being substantially unbeknownst to all parties other than the computing device. - View Dependent Claims (22, 23, 24)
-
-
25. A non-transitory computer-readable medium having computer-executable instructions for performing the steps of:
-
receiving, at a computing device, entropy data supplied from an external data source, wherein the entropy data comprises random data that is non-deterministic in origin; scoring, at the computing device, the entropy data to determine whether the entropy data meets or exceeds a predetermined policy score; developing, at the computing device, a reputation value of the data source based upon the scoring; receiving, at the computing device, subsequent entropy data from the data source and performing subsequent scoring of the subsequent entropy data, the performing the subsequent scoring using the developed reputation value; for a later intended application requiring entropy data, selecting, at the computing device, only certain of the supplied or subsequent entropy data for use in the intended application; and discarding, at the computing device, all other entropy data not found in the selected certain of the supplied or subsequent entropy data, the act of the discarding or the amount of the discarding being substantially unbeknownst to all parties other than the computing device.
-
Specification