[go: up one dir, main page]

TWI562015B - Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium - Google Patents

Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium

Info

Publication number
TWI562015B
TWI562015B TW104103470A TW104103470A TWI562015B TW I562015 B TWI562015 B TW I562015B TW 104103470 A TW104103470 A TW 104103470A TW 104103470 A TW104103470 A TW 104103470A TW I562015 B TWI562015 B TW I562015B
Authority
TW
Taiwan
Prior art keywords
verifier
act
storage medium
readable storage
transitory machine
Prior art date
Application number
TW104103470A
Other languages
English (en)
Other versions
TW201539241A (zh
Inventor
Steffen Schulz
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of TW201539241A publication Critical patent/TW201539241A/zh
Application granted granted Critical
Publication of TWI562015B publication Critical patent/TWI562015B/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
TW104103470A 2014-03-13 2015-02-02 Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium TWI562015B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/209,129 US9509502B2 (en) 2014-03-13 2014-03-13 Symmetric keying and chain of trust

Publications (2)

Publication Number Publication Date
TW201539241A TW201539241A (zh) 2015-10-16
TWI562015B true TWI562015B (en) 2016-12-11

Family

ID=54070178

Family Applications (2)

Application Number Title Priority Date Filing Date
TW105130006A TWI623853B (zh) 2014-03-13 2015-02-02 用以充當驗證器之裝置、用於遠端認證之方法及非暫時性機器可讀儲存媒體(二)
TW104103470A TWI562015B (en) 2014-03-13 2015-02-02 Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW105130006A TWI623853B (zh) 2014-03-13 2015-02-02 用以充當驗證器之裝置、用於遠端認證之方法及非暫時性機器可讀儲存媒體(二)

Country Status (3)

Country Link
US (1) US9509502B2 (zh)
TW (2) TWI623853B (zh)
WO (1) WO2015138246A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11251976B2 (en) 2019-02-26 2022-02-15 Advanced New Technologies Co., Ltd. Data security processing method and terminal thereof, and server

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102014016606A1 (de) * 2014-11-10 2016-05-12 Giesecke & Devrient Gmbh Verfahren zum Überprüfen der Gültigkeit eines Tickets; mobile Einrichtung
GB2535165B (en) * 2015-02-09 2021-09-29 Arm Ip Ltd A method of establishing trust between a device and an apparatus
US10341384B2 (en) * 2015-07-12 2019-07-02 Avago Technologies International Sales Pte. Limited Network function virtualization security and trust system
US10417218B2 (en) 2015-12-23 2019-09-17 Intel Corporation Techniques to achieve ordering among storage device transactions
US10114949B2 (en) * 2015-12-24 2018-10-30 Mcafee, Llc Techniques for monitoring integrity of OS security routine
US10516654B2 (en) * 2016-03-15 2019-12-24 Intel Corporation System, apparatus and method for key provisioning delegation
CN107347058B (zh) 2016-05-06 2021-07-23 阿里巴巴集团控股有限公司 数据加密方法、数据解密方法、装置及系统
EA201990315A1 (ru) 2016-09-15 2019-08-30 НАТС ХОЛДИНГЗ, ЭлЭлСи Зашифрованный транзит и хранение пользовательских данных
WO2018112482A1 (en) * 2016-12-15 2018-06-21 Alibaba Group Holding Limited Method and system for distributing attestation key and certificate in trusted computing
CN108234115B (zh) * 2016-12-15 2021-03-09 阿里巴巴集团控股有限公司 信息安全的验证方法、装置和系统
US10164778B2 (en) 2016-12-15 2018-12-25 Alibaba Group Holding Limited Method and system for distributing attestation key and certificate in trusted computing
US10671547B2 (en) 2016-12-19 2020-06-02 Intel Corporation Lightweight trusted tasks
GB201700367D0 (en) * 2017-01-10 2017-02-22 Trustonic Ltd A system for recording and attesting device lifecycle
WO2018228732A1 (en) * 2017-06-14 2018-12-20 Gemalto Sa Method for mutual symmetric authentication between a first application and a second application
US11290466B2 (en) * 2017-08-16 2022-03-29 Cable Television Laboratories, Inc. Systems and methods for network access granting
EP3750272A4 (en) 2018-02-06 2021-12-15 Nb Research Llc SYSTEM AND PROCEDURE FOR SECURING A RESOURCE
CN108418691B (zh) * 2018-03-08 2020-10-27 湖南大学 基于sgx的动态网络身份认证方法
GB201806112D0 (en) * 2018-04-13 2018-05-30 Nchain Holdings Ltd Computer-implemented system and method
US10841284B2 (en) * 2018-05-30 2020-11-17 Lear Corporation Vehicle communication network and method
CN109450620B (zh) 2018-10-12 2020-11-10 创新先进技术有限公司 一种移动终端中共享安全应用的方法及移动终端
US10735205B1 (en) * 2019-03-08 2020-08-04 Ares Technologies, Inc. Methods and systems for implementing an anonymized attestation chain
CN109993003A (zh) * 2019-03-12 2019-07-09 广州大学 一种基于sgx的软件流安全验证方法及装置
CN113474777A (zh) * 2019-04-18 2021-10-01 惠普发展公司,有限责任合伙企业 服务信任状态
KR102194077B1 (ko) * 2019-04-26 2020-12-23 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. 신뢰 실행 환경을 위한 분산 키 관리
US11657157B2 (en) 2019-06-06 2023-05-23 Macronix International Co., Ltd. Secure boot system, method and apparatus
TWI728377B (zh) * 2019-06-06 2021-05-21 旺宏電子股份有限公司 安全啟動系統、方法及裝置
US11429519B2 (en) 2019-12-23 2022-08-30 Alibaba Group Holding Limited System and method for facilitating reduction of latency and mitigation of write amplification in a multi-tenancy storage drive
US12317079B2 (en) 2020-03-13 2025-05-27 Sony Group Corporation Apparatus, a method and a computer program for verifying an integrity of a device connected to a telecommunication network
US11483299B2 (en) * 2020-10-21 2022-10-25 Arm Limited Method and apparatus for encrypted communication
EP4002756B1 (en) * 2020-11-24 2022-11-02 Axis AB Systems and methods of managing a certificate associated with a component located at a remote location
US12105804B2 (en) * 2021-07-17 2024-10-01 International Business Machines Corporation Securely executing software based on cryptographically verified instructions
US20240322596A1 (en) * 2023-03-21 2024-09-26 Cisco Technology, Inc. Generating Verifiable Power Line Sustainability Data
US12512970B2 (en) * 2023-06-20 2025-12-30 Microsoft Technology Licensing, Llc Cryptographic key hierarchy

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201108699A (en) * 2009-06-24 2011-03-01 Vierfire Software Ltd Authentication method and system
CN103477602A (zh) * 2011-04-15 2013-12-25 诺基亚公司 用于提供秘密委托的方法和设备

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6381698B1 (en) * 1997-05-21 2002-04-30 At&T Corp System and method for providing assurance to a host that a piece of software possesses a particular property
US7974416B2 (en) 2002-11-27 2011-07-05 Intel Corporation Providing a secure execution mode in a pre-boot environment
US20050132357A1 (en) 2003-12-16 2005-06-16 Microsoft Corporation Ensuring that a software update may be installed or run only on a specific device or class of devices
US7421588B2 (en) 2003-12-30 2008-09-02 Lenovo Pte Ltd Apparatus, system, and method for sealing a data repository to a trusted computing platform
US7266198B2 (en) * 2004-11-17 2007-09-04 General Instrument Corporation System and method for providing authorized access to digital content
US7945786B2 (en) 2007-03-30 2011-05-17 Intel Corporation Method and apparatus to re-create trust model after sleep state
GB0707150D0 (en) * 2007-04-13 2007-05-23 Hewlett Packard Development Co Dynamic trust management
US8782801B2 (en) 2007-08-15 2014-07-15 Samsung Electronics Co., Ltd. Securing stored content for trusted hosts and safe computing environments
US20090300348A1 (en) 2008-06-02 2009-12-03 Samsung Electronics Co., Ltd. Preventing abuse of services in trusted computing environments
US20100082960A1 (en) 2008-09-30 2010-04-01 Steve Grobman Protected network boot of operating system
CN102405630B (zh) * 2009-04-20 2017-04-12 交互数字专利控股公司 多个域和域所有权的系统
TWI403895B (zh) * 2009-06-19 2013-08-01 Inventec Corp 計算機的自動測試系統及其測試方法
US8510569B2 (en) 2009-12-16 2013-08-13 Intel Corporation Providing integrity verification and attestation in a hidden execution environment
WO2011100331A1 (en) 2010-02-09 2011-08-18 Interdigital Patent Holdings, Inc Method and apparatus for trusted federated identity
WO2013028059A1 (en) 2011-08-25 2013-02-28 Mimos Berhad Verification system for trusted platform
US9208354B2 (en) 2013-03-12 2015-12-08 Intel Corporation Techniques for securing use of one-time passwords
US9395993B2 (en) 2013-07-29 2016-07-19 Intel Corporation Execution-aware memory protection

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201108699A (en) * 2009-06-24 2011-03-01 Vierfire Software Ltd Authentication method and system
CN103477602A (zh) * 2011-04-15 2013-12-25 诺基亚公司 用于提供秘密委托的方法和设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Jerome Azema, Gilles Fayad,"M-Shield(TM) Mobile Security Technology: making wireless secure", February 2008, 6 pages *
Ronald Toegl, Michael Hutter,"An approach to introducing locality in remote attestation using near field communications", The Journal of Supercomputing, Volume 55, Issue 2, February 2011, pp. 207-227 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11251976B2 (en) 2019-02-26 2022-02-15 Advanced New Technologies Co., Ltd. Data security processing method and terminal thereof, and server

Also Published As

Publication number Publication date
TW201717096A (zh) 2017-05-16
WO2015138246A1 (en) 2015-09-17
US9509502B2 (en) 2016-11-29
US20150263855A1 (en) 2015-09-17
TW201539241A (zh) 2015-10-16
TWI623853B (zh) 2018-05-11

Similar Documents

Publication Publication Date Title
TWI562015B (en) Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium
GB2522551B (en) Three-dimensional-shape measurement apparatus, three-dimensional-shape measurement method, and non-transitory computer-readable storage medium
TWI561969B (en) Processor, machine-readable medium and system for low power management
IL253050B (en) A method to increase memory consolidation
GB2530312B (en) Data compression
GB2530311B (en) Data compression
SG11201606403YA (en) Authentication system and method
IL235729A0 (en) A device and method for securely storing information
ZA201605304B (en) System and method for communicating credentials
SG11201704477VA (en) Power system and method
IL230858A0 (en) System and method for high output pumped energy
SG10201408159TA (en) Authentication method
SG10201406045PA (en) Authentication system and method
IL246870B (en) Method for preparing 1-alkyl-3-difluoromethyl-5-fluoro-1h-pyrazole-4-carbaldehydes and 1-alkyl-3-difluoromethyl-5-fluoro-1h-pyrazole-4-carboxylates
ZA201508691B (en) Cooling system and method
ZA201607883B (en) Card shooter device and card storage method
SG11201605979VA (en) Communication device, communication system, communication method, and storage medium
GB2529398B (en) Fuel, system and method
SG11201702433RA (en) Analysis System, Analysis Method, And Storage Medium
GB201416082D0 (en) Method and uses
EP3160070A4 (en) Multi-stage encoding device, method for implementing multi-stage encoding device and storage medium
IL232091A0 (en) Code activated locking system and methods to use
GB201407165D0 (en) An authentication method
TWI563231B (en) High performance and low cost heat pump apparatus
GB201405150D0 (en) System, device and method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees