Systems and methods for security tiering in peer-to-peer networking
A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable sec...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Konetski David Molsberry Frank H Lo Yuan-Chang Anson Douglas M Andrews Carlton A Robison Charles D |
description | A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9723012B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9723012B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9723012B23</originalsourceid><addsrcrecordid>eNrjZHAOriwuSc0tVkjMS1HITS3JyE8pVkjLL1IoTk0uLcosqVQoyUwtysxLV8jMUyhITS3SLcnXBdEKeakl5flF2UApHgbWtMSc4lReKM3NoODmGuLsoZtakB-fWlyQmJwKVBwfGmxpbmRsYGjkZGRMhBIAOmoycA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Systems and methods for security tiering in peer-to-peer networking</title><source>esp@cenet</source><creator>Konetski David ; Molsberry Frank H ; Lo Yuan-Chang ; Anson Douglas M ; Andrews Carlton A ; Robison Charles D</creator><creatorcontrib>Konetski David ; Molsberry Frank H ; Lo Yuan-Chang ; Anson Douglas M ; Andrews Carlton A ; Robison Charles D</creatorcontrib><description>A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170801&DB=EPODOC&CC=US&NR=9723012B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170801&DB=EPODOC&CC=US&NR=9723012B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Konetski David</creatorcontrib><creatorcontrib>Molsberry Frank H</creatorcontrib><creatorcontrib>Lo Yuan-Chang</creatorcontrib><creatorcontrib>Anson Douglas M</creatorcontrib><creatorcontrib>Andrews Carlton A</creatorcontrib><creatorcontrib>Robison Charles D</creatorcontrib><title>Systems and methods for security tiering in peer-to-peer networking</title><description>A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHAOriwuSc0tVkjMS1HITS3JyE8pVkjLL1IoTk0uLcosqVQoyUwtysxLV8jMUyhITS3SLcnXBdEKeakl5flF2UApHgbWtMSc4lReKM3NoODmGuLsoZtakB-fWlyQmJwKVBwfGmxpbmRsYGjkZGRMhBIAOmoycA</recordid><startdate>20170801</startdate><enddate>20170801</enddate><creator>Konetski David</creator><creator>Molsberry Frank H</creator><creator>Lo Yuan-Chang</creator><creator>Anson Douglas M</creator><creator>Andrews Carlton A</creator><creator>Robison Charles D</creator><scope>EVB</scope></search><sort><creationdate>20170801</creationdate><title>Systems and methods for security tiering in peer-to-peer networking</title><author>Konetski David ; Molsberry Frank H ; Lo Yuan-Chang ; Anson Douglas M ; Andrews Carlton A ; Robison Charles D</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9723012B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Konetski David</creatorcontrib><creatorcontrib>Molsberry Frank H</creatorcontrib><creatorcontrib>Lo Yuan-Chang</creatorcontrib><creatorcontrib>Anson Douglas M</creatorcontrib><creatorcontrib>Andrews Carlton A</creatorcontrib><creatorcontrib>Robison Charles D</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Konetski David</au><au>Molsberry Frank H</au><au>Lo Yuan-Chang</au><au>Anson Douglas M</au><au>Andrews Carlton A</au><au>Robison Charles D</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Systems and methods for security tiering in peer-to-peer networking</title><date>2017-08-01</date><risdate>2017</risdate><abstract>A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9723012B2 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Systems and methods for security tiering in peer-to-peer networking |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T01%3A05%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Konetski%20David&rft.date=2017-08-01&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9723012B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |