Method and apparatus for surveillance system peering
First Claim
1. A method for scalable sharing of security assets comprising:
- identifying a plurality of security assets from contributors, the contributors each owning security assets that are selectively enabled for access by a subscriber;
receiving an indication of shareability for each asset contributed by the contributor;
designating a subset of the identified security assets as a group for remote access;
receiving a delegation to authorize a subscriber for access to the security asset, delegating further including identifying an agent, the agent having authority to designate access to contributed security assets, the subscriber responsive to receiving, from the identified agent, a token operative to provide access to the security asset; and
authorizing the subscriber for access to the designated group of security assets, the group having collective access by the authorized subscriber.
5 Assignments
0 Petitions
Accused Products
Abstract
A security installation positions a peering ability with a peer installation by establishing a peering agreement to define the conditions constituting a situation for which peering applies, and identifies the resources and assets which will be shared, as well as the duration of the peering, typically until the resolution of the exigent situation or circumstances that prompted the peering. Peering selectively couples security installations for monitoring a particular upon determining that a situation responsive to mediation has occurred within an area monitored by the security installation for monitoring an area. The security installation initiates a peering invitation to a peer installation, in which the peer installation is configured to share resources with the security installation for mitigating the cause of the situation. The resulting peered access provides communication between the peer installation and the security installation, the access being temporary and conditional on the exigency of the determined situation.
63 Citations
18 Claims
-
1. A method for scalable sharing of security assets comprising:
-
identifying a plurality of security assets from contributors, the contributors each owning security assets that are selectively enabled for access by a subscriber; receiving an indication of shareability for each asset contributed by the contributor; designating a subset of the identified security assets as a group for remote access; receiving a delegation to authorize a subscriber for access to the security asset, delegating further including identifying an agent, the agent having authority to designate access to contributed security assets, the subscriber responsive to receiving, from the identified agent, a token operative to provide access to the security asset; and authorizing the subscriber for access to the designated group of security assets, the group having collective access by the authorized subscriber. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A repository of security assets, comprising:
-
a set of information repositories for storing; an identity of security assets configured for gathering security information; subscribers that receive access to the security assets; contributors that own the security assets that may be enabled for access by subscribers, each contributor designating a subset of owned security assets that are selectively enabled for access by the subscribers; an indication of shareability for each designated asset contributed by the contributor; and agents having authority to designate access to the contributed security assets to the subscribers on behalf of the contributors; a token, the token issued by an agent to a subscriber for designating access to a security asset, the token indicative of the security asset and the accessing subscriber; rules indicative of conditions under which the subscribers may invoke the designated access to the security assets; and logic responsive to requests for the stored security assets, subscribers, contributors, agent and rules, the logic responsive to receiving a delegation to authorize a subscriber for access to the security asset, the group having collective access by the authorized subscriber. - View Dependent Claims (9, 10)
-
-
11. A system for controlling access to shared security assets comprising:
-
a server for identifying a plurality of security assets from contributors, each contributor designating a subset of the identified security assets for remote access; an agent having authority to designate access to the contributed security assets to the subscribers on behalf of the contributors; and a plurality of tokens, each security asset responsive to a token, the token transferred to the subscriber by the agent upon agent approval, further comprising establishment of a first trust relation from the contributor to the agent, the first trust relation for permitting access to a particular security asset, and a second trust relation from the agent to the subscriber, the second trust relation for affording access to the security asset by the subscriber, wherein the contributor is not privy to the second trust relation. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification