TWI562015B - Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium - Google Patents
Device to act as verifier, method for remote attestation and non-transitory machine-readable storage mediumInfo
- Publication number
- TWI562015B TWI562015B TW104103470A TW104103470A TWI562015B TW I562015 B TWI562015 B TW I562015B TW 104103470 A TW104103470 A TW 104103470A TW 104103470 A TW104103470 A TW 104103470A TW I562015 B TWI562015 B TW I562015B
- Authority
- TW
- Taiwan
- Prior art keywords
- verifier
- act
- storage medium
- readable storage
- transitory machine
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/209,129 US9509502B2 (en) | 2014-03-13 | 2014-03-13 | Symmetric keying and chain of trust |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW201539241A TW201539241A (zh) | 2015-10-16 |
| TWI562015B true TWI562015B (en) | 2016-12-11 |
Family
ID=54070178
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW105130006A TWI623853B (zh) | 2014-03-13 | 2015-02-02 | 用以充當驗證器之裝置、用於遠端認證之方法及非暫時性機器可讀儲存媒體(二) |
| TW104103470A TWI562015B (en) | 2014-03-13 | 2015-02-02 | Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW105130006A TWI623853B (zh) | 2014-03-13 | 2015-02-02 | 用以充當驗證器之裝置、用於遠端認證之方法及非暫時性機器可讀儲存媒體(二) |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US9509502B2 (zh) |
| TW (2) | TWI623853B (zh) |
| WO (1) | WO2015138246A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11251976B2 (en) | 2019-02-26 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Data security processing method and terminal thereof, and server |
Families Citing this family (33)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102014016606A1 (de) * | 2014-11-10 | 2016-05-12 | Giesecke & Devrient Gmbh | Verfahren zum Überprüfen der Gültigkeit eines Tickets; mobile Einrichtung |
| GB2535165B (en) * | 2015-02-09 | 2021-09-29 | Arm Ip Ltd | A method of establishing trust between a device and an apparatus |
| US10341384B2 (en) * | 2015-07-12 | 2019-07-02 | Avago Technologies International Sales Pte. Limited | Network function virtualization security and trust system |
| US10417218B2 (en) | 2015-12-23 | 2019-09-17 | Intel Corporation | Techniques to achieve ordering among storage device transactions |
| US10114949B2 (en) * | 2015-12-24 | 2018-10-30 | Mcafee, Llc | Techniques for monitoring integrity of OS security routine |
| US10516654B2 (en) * | 2016-03-15 | 2019-12-24 | Intel Corporation | System, apparatus and method for key provisioning delegation |
| CN107347058B (zh) | 2016-05-06 | 2021-07-23 | 阿里巴巴集团控股有限公司 | 数据加密方法、数据解密方法、装置及系统 |
| EA201990315A1 (ru) | 2016-09-15 | 2019-08-30 | НАТС ХОЛДИНГЗ, ЭлЭлСи | Зашифрованный транзит и хранение пользовательских данных |
| WO2018112482A1 (en) * | 2016-12-15 | 2018-06-21 | Alibaba Group Holding Limited | Method and system for distributing attestation key and certificate in trusted computing |
| CN108234115B (zh) * | 2016-12-15 | 2021-03-09 | 阿里巴巴集团控股有限公司 | 信息安全的验证方法、装置和系统 |
| US10164778B2 (en) | 2016-12-15 | 2018-12-25 | Alibaba Group Holding Limited | Method and system for distributing attestation key and certificate in trusted computing |
| US10671547B2 (en) | 2016-12-19 | 2020-06-02 | Intel Corporation | Lightweight trusted tasks |
| GB201700367D0 (en) * | 2017-01-10 | 2017-02-22 | Trustonic Ltd | A system for recording and attesting device lifecycle |
| WO2018228732A1 (en) * | 2017-06-14 | 2018-12-20 | Gemalto Sa | Method for mutual symmetric authentication between a first application and a second application |
| US11290466B2 (en) * | 2017-08-16 | 2022-03-29 | Cable Television Laboratories, Inc. | Systems and methods for network access granting |
| EP3750272A4 (en) | 2018-02-06 | 2021-12-15 | Nb Research Llc | SYSTEM AND PROCEDURE FOR SECURING A RESOURCE |
| CN108418691B (zh) * | 2018-03-08 | 2020-10-27 | 湖南大学 | 基于sgx的动态网络身份认证方法 |
| GB201806112D0 (en) * | 2018-04-13 | 2018-05-30 | Nchain Holdings Ltd | Computer-implemented system and method |
| US10841284B2 (en) * | 2018-05-30 | 2020-11-17 | Lear Corporation | Vehicle communication network and method |
| CN109450620B (zh) | 2018-10-12 | 2020-11-10 | 创新先进技术有限公司 | 一种移动终端中共享安全应用的方法及移动终端 |
| US10735205B1 (en) * | 2019-03-08 | 2020-08-04 | Ares Technologies, Inc. | Methods and systems for implementing an anonymized attestation chain |
| CN109993003A (zh) * | 2019-03-12 | 2019-07-09 | 广州大学 | 一种基于sgx的软件流安全验证方法及装置 |
| CN113474777A (zh) * | 2019-04-18 | 2021-10-01 | 惠普发展公司,有限责任合伙企业 | 服务信任状态 |
| KR102194077B1 (ko) * | 2019-04-26 | 2020-12-23 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | 신뢰 실행 환경을 위한 분산 키 관리 |
| US11657157B2 (en) | 2019-06-06 | 2023-05-23 | Macronix International Co., Ltd. | Secure boot system, method and apparatus |
| TWI728377B (zh) * | 2019-06-06 | 2021-05-21 | 旺宏電子股份有限公司 | 安全啟動系統、方法及裝置 |
| US11429519B2 (en) | 2019-12-23 | 2022-08-30 | Alibaba Group Holding Limited | System and method for facilitating reduction of latency and mitigation of write amplification in a multi-tenancy storage drive |
| US12317079B2 (en) | 2020-03-13 | 2025-05-27 | Sony Group Corporation | Apparatus, a method and a computer program for verifying an integrity of a device connected to a telecommunication network |
| US11483299B2 (en) * | 2020-10-21 | 2022-10-25 | Arm Limited | Method and apparatus for encrypted communication |
| EP4002756B1 (en) * | 2020-11-24 | 2022-11-02 | Axis AB | Systems and methods of managing a certificate associated with a component located at a remote location |
| US12105804B2 (en) * | 2021-07-17 | 2024-10-01 | International Business Machines Corporation | Securely executing software based on cryptographically verified instructions |
| US20240322596A1 (en) * | 2023-03-21 | 2024-09-26 | Cisco Technology, Inc. | Generating Verifiable Power Line Sustainability Data |
| US12512970B2 (en) * | 2023-06-20 | 2025-12-30 | Microsoft Technology Licensing, Llc | Cryptographic key hierarchy |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW201108699A (en) * | 2009-06-24 | 2011-03-01 | Vierfire Software Ltd | Authentication method and system |
| CN103477602A (zh) * | 2011-04-15 | 2013-12-25 | 诺基亚公司 | 用于提供秘密委托的方法和设备 |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6381698B1 (en) * | 1997-05-21 | 2002-04-30 | At&T Corp | System and method for providing assurance to a host that a piece of software possesses a particular property |
| US7974416B2 (en) | 2002-11-27 | 2011-07-05 | Intel Corporation | Providing a secure execution mode in a pre-boot environment |
| US20050132357A1 (en) | 2003-12-16 | 2005-06-16 | Microsoft Corporation | Ensuring that a software update may be installed or run only on a specific device or class of devices |
| US7421588B2 (en) | 2003-12-30 | 2008-09-02 | Lenovo Pte Ltd | Apparatus, system, and method for sealing a data repository to a trusted computing platform |
| US7266198B2 (en) * | 2004-11-17 | 2007-09-04 | General Instrument Corporation | System and method for providing authorized access to digital content |
| US7945786B2 (en) | 2007-03-30 | 2011-05-17 | Intel Corporation | Method and apparatus to re-create trust model after sleep state |
| GB0707150D0 (en) * | 2007-04-13 | 2007-05-23 | Hewlett Packard Development Co | Dynamic trust management |
| US8782801B2 (en) | 2007-08-15 | 2014-07-15 | Samsung Electronics Co., Ltd. | Securing stored content for trusted hosts and safe computing environments |
| US20090300348A1 (en) | 2008-06-02 | 2009-12-03 | Samsung Electronics Co., Ltd. | Preventing abuse of services in trusted computing environments |
| US20100082960A1 (en) | 2008-09-30 | 2010-04-01 | Steve Grobman | Protected network boot of operating system |
| CN102405630B (zh) * | 2009-04-20 | 2017-04-12 | 交互数字专利控股公司 | 多个域和域所有权的系统 |
| TWI403895B (zh) * | 2009-06-19 | 2013-08-01 | Inventec Corp | 計算機的自動測試系統及其測試方法 |
| US8510569B2 (en) | 2009-12-16 | 2013-08-13 | Intel Corporation | Providing integrity verification and attestation in a hidden execution environment |
| WO2011100331A1 (en) | 2010-02-09 | 2011-08-18 | Interdigital Patent Holdings, Inc | Method and apparatus for trusted federated identity |
| WO2013028059A1 (en) | 2011-08-25 | 2013-02-28 | Mimos Berhad | Verification system for trusted platform |
| US9208354B2 (en) | 2013-03-12 | 2015-12-08 | Intel Corporation | Techniques for securing use of one-time passwords |
| US9395993B2 (en) | 2013-07-29 | 2016-07-19 | Intel Corporation | Execution-aware memory protection |
-
2014
- 2014-03-13 US US14/209,129 patent/US9509502B2/en active Active
-
2015
- 2015-02-02 TW TW105130006A patent/TWI623853B/zh not_active IP Right Cessation
- 2015-02-02 TW TW104103470A patent/TWI562015B/zh not_active IP Right Cessation
- 2015-03-06 WO PCT/US2015/019216 patent/WO2015138246A1/en not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW201108699A (en) * | 2009-06-24 | 2011-03-01 | Vierfire Software Ltd | Authentication method and system |
| CN103477602A (zh) * | 2011-04-15 | 2013-12-25 | 诺基亚公司 | 用于提供秘密委托的方法和设备 |
Non-Patent Citations (2)
| Title |
|---|
| Jerome Azema, Gilles Fayad,"M-Shield(TM) Mobile Security Technology: making wireless secure", February 2008, 6 pages * |
| Ronald Toegl, Michael Hutter,"An approach to introducing locality in remote attestation using near field communications", The Journal of Supercomputing, Volume 55, Issue 2, February 2011, pp. 207-227 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11251976B2 (en) | 2019-02-26 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Data security processing method and terminal thereof, and server |
Also Published As
| Publication number | Publication date |
|---|---|
| TW201717096A (zh) | 2017-05-16 |
| WO2015138246A1 (en) | 2015-09-17 |
| US9509502B2 (en) | 2016-11-29 |
| US20150263855A1 (en) | 2015-09-17 |
| TW201539241A (zh) | 2015-10-16 |
| TWI623853B (zh) | 2018-05-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TWI562015B (en) | Device to act as verifier, method for remote attestation and non-transitory machine-readable storage medium | |
| GB2522551B (en) | Three-dimensional-shape measurement apparatus, three-dimensional-shape measurement method, and non-transitory computer-readable storage medium | |
| TWI561969B (en) | Processor, machine-readable medium and system for low power management | |
| IL253050B (en) | A method to increase memory consolidation | |
| GB2530312B (en) | Data compression | |
| GB2530311B (en) | Data compression | |
| SG11201606403YA (en) | Authentication system and method | |
| IL235729A0 (en) | A device and method for securely storing information | |
| ZA201605304B (en) | System and method for communicating credentials | |
| SG11201704477VA (en) | Power system and method | |
| IL230858A0 (en) | System and method for high output pumped energy | |
| SG10201408159TA (en) | Authentication method | |
| SG10201406045PA (en) | Authentication system and method | |
| IL246870B (en) | Method for preparing 1-alkyl-3-difluoromethyl-5-fluoro-1h-pyrazole-4-carbaldehydes and 1-alkyl-3-difluoromethyl-5-fluoro-1h-pyrazole-4-carboxylates | |
| ZA201508691B (en) | Cooling system and method | |
| ZA201607883B (en) | Card shooter device and card storage method | |
| SG11201605979VA (en) | Communication device, communication system, communication method, and storage medium | |
| GB2529398B (en) | Fuel, system and method | |
| SG11201702433RA (en) | Analysis System, Analysis Method, And Storage Medium | |
| GB201416082D0 (en) | Method and uses | |
| EP3160070A4 (en) | Multi-stage encoding device, method for implementing multi-stage encoding device and storage medium | |
| IL232091A0 (en) | Code activated locking system and methods to use | |
| GB201407165D0 (en) | An authentication method | |
| TWI563231B (en) | High performance and low cost heat pump apparatus | |
| GB201405150D0 (en) | System, device and method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |