Devices, systems, and methods for monitoring and asserting trust level using persistent trust log
First Claim
Patent Images
1. A computing device having a trust level, the computing device comprising:
- a memory having stored therein a persistent trust log, wherein the persistent trust log comprises data relating to historic events influencing the trust level of the computing device; and
a security controller configured to (i) detect events that influence the trust level of the computing device, (ii) write data relating to the events to the persistent trust log, (iii) receive a trust assessment request that includes a trust profile from an external service that resides on a server external to the computing device, (iv) analyze the data in the persistent trust log, at least in part, using one or more criteria included in the trust profile, (v) generate a trust assessment based on the data analysis, and (vi) transmit the trust assessment to the external service.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing a trust level of the computing device, and a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log.
-
Citations
23 Claims
-
1. A computing device having a trust level, the computing device comprising:
-
a memory having stored therein a persistent trust log, wherein the persistent trust log comprises data relating to historic events influencing the trust level of the computing device; and a security controller configured to (i) detect events that influence the trust level of the computing device, (ii) write data relating to the events to the persistent trust log, (iii) receive a trust assessment request that includes a trust profile from an external service that resides on a server external to the computing device, (iv) analyze the data in the persistent trust log, at least in part, using one or more criteria included in the trust profile, (v) generate a trust assessment based on the data analysis, and (vi) transmit the trust assessment to the external service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for asserting a trust level of a computing device, the method comprising:
-
receiving a trust assessment request including a trust profile from an external service residing on a server external to the computing device; analyzing, at a security engine of the computing device, data stored in a persistent trust log on the computing device based, at least in part, on one or more criteria included in the trust profile, wherein the data stored in the persistent trust log relates to historic events influencing the trust level of the computing device; generating, at the security engine, a trust assessment based on the data analysis; and transmitting, by the security engine, the trust assessment to the external service. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. One or more non-transitory, machine readable storage media comprising a plurality of instructions stored thereon that, in response to being executed, result in a computing device:
-
receiving a trust assessment request including a trust profile from an external service residing on a server external to the computing device; analyzing data stored in a persistent trust log on the computing device based on, at least in part, one or more criteria included in the trust profile, wherein the data stored in the persistent trust log relates to historic events influencing the trust level of the computing device; generating a trust assessment based on the data analysis using a security engine of the computing device; and transmitting the trust assessment to the external. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification