Invention Grant
US08239917B2 Systems and methods for enterprise security with collaborative peer to peer architecture
有权
用于企业安全的系统和方法,具有协作对等体系结构
- Patent Title: Systems and methods for enterprise security with collaborative peer to peer architecture
- Patent Title (中): 用于企业安全的系统和方法,具有协作对等体系结构
-
Application No.: US11928256Application Date: 2007-10-30
-
Publication No.: US08239917B2Publication Date: 2012-08-07
- Inventor: Frank J. Hammond, II , Frank J. Ricotta, Jr. , Hans Michael Dykstra , Blake Andrew Williams , Steven James Carlander , Sarah Williams Gerber
- Applicant: Frank J. Hammond, II , Frank J. Ricotta, Jr. , Hans Michael Dykstra , Blake Andrew Williams , Steven James Carlander , Sarah Williams Gerber
- Applicant Address: US CO Colorado Springs
- Assignee: Enterprise Information Management, Inc.
- Current Assignee: Enterprise Information Management, Inc.
- Current Assignee Address: US CO Colorado Springs
- Agency: Lathrop & Gage LLP
- Main IPC: G06F17/00
- IPC: G06F17/00 ; G06F7/02 ; G06F15/16 ; H04L29/06

Abstract:
Systems and methods authenticate a device to operate within an enterprise system with an enterprise policy. An agent, installed on the device, analyzes the device to determine profile information of the device. The determined profile information is sent to a type 2 super peer that verifies whether the profile information conforms to the enterprise policy. If the profile information conforms to the enterprise policy, an agent trust credential is generated, within the type 2 super peer, for the agent, based upon the profile information, and issued to the agent. Authenticity of the device is verified based upon the agent trust credential. If the device is authenticated, communications with the device are permitted. If the device is not authenticated, communications with the device is prevented. In another embodiment, a method restores a device to conform to a system policy. A snapshot of critical components of the device is taken while the device is in compliance with the system policy. The critical components are monitored to identify critical components that differ from the critical components of the snapshot. If differing critical components are detected, the device is restored to conform with system policy by replacing differing critical components based upon the snapshot.
Public/Granted literature
- US20080307488A1 Systems And Methods For Enterprise Security With Collaborative Peer To Peer Architecture Public/Granted day:2008-12-11
Information query