Processing

Please wait...

Settings

Settings

Goto Application

1. WO2006094275 - TRUST EVALUATION SYSTEMS AND METHODS

Publication Number WO/2006/094275
Publication Date 08.09.2006
International Application No. PCT/US2006/007940
International Filing Date 02.03.2006
IPC
G06F 11/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
11Error detection; Error correction; Monitoring
CPC
G06F 21/55
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
H04L 63/08
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
H04L 63/104
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
10for controlling access to network resources
104Grouping of entities
H04L 63/14
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
H04L 63/1408
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1408by monitoring network traffic
Applicants
  • MARKMONITOR, INC. [US]/[US] (AllExceptUS)
  • SHULL, Mark [US]/[US] (UsOnly)
  • BOHLMAN, William [US]/[US] (UsOnly)
  • SHRAIM, Ihab [US]/[US] (UsOnly)
  • BURA, Christopher, J. [US]/[US] (UsOnly)
Inventors
  • SHULL, Mark
  • BOHLMAN, William
  • SHRAIM, Ihab
  • BURA, Christopher, J.
Agents
  • KING, Chad
Priority Data
60/658,08702.03.2005US
60/658,12402.03.2005US
60/658,28102.03.2005US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) TRUST EVALUATION SYSTEMS AND METHODS
(FR) SYSTEMES ET PROCEDES D'EVALUATION DE CONFIANCE
Abstract
(EN)
Embodiments of the present invention provide methods, systems, and software for implementing trust policies. Such policies may be implemented in a variety of ways, including at one or more border devices, client computers, etc. In accordance with various embodiments, a communication between a client computer (and/or application) and an online entity may be monitored and/or otherwise detected. The online entity may be identified, and/or one or more trust scores associated with the online entity may be obtained. Based on the trust scores, as well, perhaps as the nature of the communication, an action (such as allowing the communication, blocking the communication, quarantining the communication, warning a user, administrator, etc.) may be taken. In some cases, a trust policy may be consulted to determine what action should be taken with respect to a given communication.
(FR)
Des modes de réalisation de la présente invention concernent des procédés, des systèmes et un logiciel destinés à mettre en oeuvre des règles de confiance. Ces règles peuvent être mises en oeuvre de différentes façons, et notamment au niveau d'un ou de plusieurs dispositifs de bordure, ordinateurs clients, etc. Selon divers modes de réalisation, une communication entre un ordinateur client (et/ou une application) et une entité en ligne peut être surveillée et/ou détectée. L'entité en ligne peut être identifiée et/ou un ou plusieurs résultats de confiance associés à l'entité en ligne peuvent être obtenus. Sur la base des résultats de confiance et, éventuellement, de la nature de la communication, une mesure peut être prise (telle que l'autorisation de la communication, le blocage de la communication, la mise en quarantaine de la communication, l'avertissement d'un utilisateur, d'un administrateur, etc.). Dans certains cas, une règle de confiance peut être consultée en vue d'une détermination de la mesure à prendre par rapport à une communication donnée.
Also published as
Latest bibliographic data on file with the International Bureau