Method to control access between network endpoints based on trust scores calculated from information system component analysis
Abstract:
Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.
Information query
Patent Agency Ranking
0/0