Unlock instant, AI-driven research and patent intelligence for your innovation.

Trust evaluation

a technology of trust evaluation and evaluation process, applied in the field of trust evaluation, can solve the problems of inability to scale well and complex validation process

Active Publication Date: 2007-08-23
TREND MICRO INC
View PDF10 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0008] The invention provides a solution for evaluating trust in a computer infrastructure. In particular, a plurality of computing devices in the computer infrastructure evaluate one or more other computing devices in the computer infrastructure based on a set of device measurements for the other computing device(s) and a set of reference measurements. To this extent, each of the plurality of computing devices also provides a set of device measurements for processing by the other computin

Problems solved by technology

Since the process of validating measurements must account for variability in the measurements received from various computing devices 104, e.g., different ordering of entries in a log, the validation process can be very complex.
However, these solutions do not scale well and are subject to failures and / or delays that create security lapses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust evaluation
  • Trust evaluation
  • Trust evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] As indicated above, the invention provides a solution for evaluating trust in a computer infrastructure. In particular, a plurality of computing devices in the computer infrastructure evaluate one or more other computing devices in the computer infrastructure based on a set of device measurements for the other computing device(s) and a set of reference measurements. To this extent, each of the plurality of computing devices also provides a set of device measurements for processing by the other computing device(s) in the computer infrastructure. The evaluations can be performed using a small amount / excess computing capacity of each computing device. When the number of computing devices in the computer infrastructure becomes too great, a plurality of sub-groups can be created in which computing devices only evaluate other computing devices in the same sub-group(s). In this manner, a distributed, efficient and scalable solution is provided for evaluating trust in a computer infr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A solution for evaluating trust in a computer infrastructure is provided. In particular, a plurality of computing devices in the computer infrastructure evaluate one or more other computing devices in the computer infrastructure based on a set of device measurements for the other computing device(s) and a set of reference measurements. To this extent, each of the plurality of computing devices also provides a set of device measurements for processing by the other computing device(s) in the computer infrastructure.

Description

FIELD OF THE INVENTION [0001] The invention relates generally to trust evaluation, and more particularly, to a solution for evaluating trust between a plurality of computing devices in a computer infrastructure. BACKGROUND OF THE INVENTION [0002] It is becoming increasingly important that a computer that seeks to communicate with another computer be able to ensure that the other computer can be trusted. For example, information for financial transactions and other sensitive information are increasingly being transferred between computers over public networks such as the Internet. In order to ensure the authenticity and security of this data, it is important that a level of trust be established between the sending and receiving computers. [0003] To meet this need various solutions have been proposed. For example, the Trusted Computing Group (TCG) has defined a set of specifications for establishing trust between two or more computing devices, which are hereby incorporated herein by r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G21C17/00G06F21/00G06F21/57
CPCG06F11/3409G06F2201/81G06F21/577
Inventor BADE, STEVEN A.KEGEL, ANDREW G.VAN DOORN, LEENDERT P.
Owner TREND MICRO INC