The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 07, 2012

Filed:

Oct. 30, 2007
Applicants:

Frank J. Hammond, Ii, Palmer Lake, CO (US);

Frank J. Ricotta, Jr., Colorado Springs, CO (US);

Hans Michael Dykstra, Monument, CO (US);

Blake Andrew Williams, Colorado Springs, CO (US);

Steven James Carlander, Monument, CO (US);

Sarah Williams Gerber, Colorado Springs, CO (US);

Inventors:

Frank J. Hammond, II, Palmer Lake, CO (US);

Frank J. Ricotta, Jr., Colorado Springs, CO (US);

Hans Michael Dykstra, Monument, CO (US);

Blake Andrew Williams, Colorado Springs, CO (US);

Steven James Carlander, Monument, CO (US);

Sarah Williams Gerber, Colorado Springs, CO (US);

Assignee:

Enterprise Information Management, Inc., Colorado Springs, CO (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 17/00 (2006.01); G06F 7/02 (2006.01); G06F 15/16 (2006.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
Abstract

Systems and methods authenticate a device to operate within an enterprise system with an enterprise policy. An agent, installed on the device, analyzes the device to determine profile information of the device. The determined profile information is sent to a type 2 super peer that verifies whether the profile information conforms to the enterprise policy. If the profile information conforms to the enterprise policy, an agent trust credential is generated, within the type 2 super peer, for the agent, based upon the profile information, and issued to the agent. Authenticity of the device is verified based upon the agent trust credential. If the device is authenticated, communications with the device are permitted. If the device is not authenticated, communications with the device is prevented. In another embodiment, a method restores a device to conform to a system policy. A snapshot of critical components of the device is taken while the device is in compliance with the system policy. The critical components are monitored to identify critical components that differ from the critical components of the snapshot. If differing critical components are detected, the device is restored to conform with system policy by replacing differing critical components based upon the snapshot.


Find Patent Forward Citations

Loading…