Method and System for Device Integrity Authentication
First Claim
1. A method for device integrity authentication, comprising:
- receiving, at a second device, data from a first device;
determining, at the second device, whether at least a portion of the data is associated with a protected datatype;
determining, at the second device, a measured integrity value of the first device in response to the portion of the data being associated with the protected datatype;
comparing, at the second device, the measured integrity value of the first device to an embedded integrity value associated with the second device;
facilitating, by the second device, application of at least one of a plurality of policies associated with processing the data based on the comparison and the protected datatype.
1 Assignment
0 Petitions
Accused Products
Abstract
Device integrity authentication is performed by receiving, at a second device, data from a first device. A determination is made at the second device as to whether at least a portion of the data is associated with a protected datatype. A measured integrity value of the first device is determined in response to the portion of the data being associated with the protected datatype. The measured integrity value of the first device is compared to an embedded integrity value associated with the second device. Application of at least one of a plurality of policies associated with processing the data is facilitated at the second device based on the comparison and the protected datatype.
37 Citations
24 Claims
-
1. A method for device integrity authentication, comprising:
-
receiving, at a second device, data from a first device; determining, at the second device, whether at least a portion of the data is associated with a protected datatype; determining, at the second device, a measured integrity value of the first device in response to the portion of the data being associated with the protected datatype; comparing, at the second device, the measured integrity value of the first device to an embedded integrity value associated with the second device; facilitating, by the second device, application of at least one of a plurality of policies associated with processing the data based on the comparison and the protected datatype. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer readable storage medium including code for device integrity authentication, the code operable to:
-
receive data from a first device for a second device; determine whether at least a portion of the data is associated with a protected datatype; determine a measured integrity value of the first device in response to the portion of the data being associated with the protected datatype; compare the measured integrity value of the first device to an embedded integrity value associated with the second device; facilitate application of at least one of a plurality of policies associated with processing the data at the second device based on the comparison and the protected datatype. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for device integrity authentication, comprising:
-
an integrity check processing module operable to; receive data from a first device for a second device; determine whether at least a portion of the data is associated with a protected datatype; determine a measured integrity value of the first device in response to the portion of the data being associated with the protected datatype; a control processing module operable to; compare the measured integrity value of the first device to an embedded integrity value associated with the second device; facilitate application of at least one of a plurality of policies associated with processing the data at the second device based on the comparison and the protected datatype. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification