Trusted computing environment
First Claim
Patent Images
1. A method of operating a trusted computing system comprising a plurality of computing devices on a network, the method comprising:
- an assessor computing device receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device; and
the assessor computing device updating via the network the trust policy of a second computing device in accordance with the report.
3 Assignments
0 Petitions
Accused Products
Abstract
A trusted computing environment 100, wherein each computing device 112 to 118 holds a policy specifying the degree to which it can trust the other devices in the environment 100. The policies are updated by an assessor 110 which receives reports from trusted components 120 in the computing devices 112 to 118 which identify the trustworthiness of the computing devices 112 to 118.
86 Citations
18 Claims
-
1. A method of operating a trusted computing system comprising a plurality of computing devices on a network, the method comprising:
-
an assessor computing device receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device; and the assessor computing device updating via the network the trust policy of a second computing device in accordance with the report. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of operating a trusted computing system comprising a plurality of computing devices on a network, in which a first computing device has a trusted component which issues a report pertaining to the trustworthiness of the first computing device wherein a trust policy controller receives said report via the network from the trusted component and updates via the network the trust policy of a second computing device in accordance with said report.
-
10. A method of operating a trusted computing system comprising multiple computing devices on a network, the method comprising:
-
a trust policy controller receiving reports via the network pertaining to the trustworthiness of each said computing device; and the trust policy controller determining the trust policy for each of said computing devices in accordance with the trustworthiness of other of said multiple computing devices as determined from said received reports.
-
- 11. An assessor computing device for controlling a trusted computing system comprising multiple computing devices on a network, the assessor comprising a receiver for receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device, an updater for updating the trust policy of a second computing device in accordance with the report, and a transmitter for transmitting the updated policy to the second computing device via the network.
-
16. A system, comprising:
-
an assessor computing device for controlling a trusted computing system comprising multiple computing devices on a network, the assessor comprising a receiver for receiving via the network a report from, and pertaining to the trustworthiness of, a first computing device, an updater for updating the trust policy of a second computing device in accordance with the report, and a transmitter for transmitting the updated policy to the second computing device, and the system further comprising first and second computing devices, wherein at least the first computing device comprises a reporter for sending via the network a trustworthiness report to the assessor computing device and at least the second computing device comprises a memory maintaining a trust policy such that the trust policy is modifiable by the transmitter. - View Dependent Claims (17)
-
-
18. A system, comprising:
-
multiple computing devices on a network, and a trust policy controller which serves to determine the trust policy of said computing devices; each of said computing devices having associated with it a trust policy memory to store a trust policy for that computing device, and a trusted component which issues a report pertaining to the trustworthiness of that computing device;
whereinthe controller receives via the network reports from the trust components and updates via the network the trust policy in the trust policy memory of each computing device in accordance with the trustworthiness of other of said multiple computing devices as determined from said reports.
-
Specification