The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 28, 2016

Filed:

May. 09, 2013
Applicant:

Porticor Ltd., Ramat Hasharon, IL;

Inventors:

Gilad Parann-Nissany, Ramat Hasharon, IL;

Yaron Sheffer, Tel Aviv, IL;

Assignee:

Porticor Ltd., Hod Hasharon, IL;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/08 (2006.01); G06F 21/60 (2013.01); G06F 21/72 (2013.01); G06F 21/62 (2013.01); H04L 29/08 (2006.01); H04L 9/00 (2006.01);
U.S. Cl.
CPC ...
H04L 63/06 (2013.01); G06F 21/602 (2013.01); G06F 21/6218 (2013.01); G06F 21/72 (2013.01); H04L 9/008 (2013.01); H04L 9/085 (2013.01); H04L 9/0822 (2013.01); H04L 9/0894 (2013.01); H04L 67/10 (2013.01); G06F 2221/2111 (2013.01); G06F 2221/2149 (2013.01); H04L 2463/062 (2013.01);
Abstract

The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining that an untrusted computing resource is trustworthy, vouching for the untrusted resource as trustworthy by a trusted computing resource upon satisfying at least one criterion of: the trusted resource was directly involved in setting up and/or activating the untrusted resource; and/or has access to a database of identifying credentials and/or information which allow the trusted resource to verify that the untrusted resource is trustworthy; and concealing at least one secret that needs to be present on any computing resource, wherein at least one secret is concealed differently on each computing resource; and transmitting at least one secret from any computing resource to any other computing resource in a way that changes the step of concealing at least one secret without any computing resource knowing at least one secret.


Find Patent Forward Citations

Loading…