[go: up one dir, main page]

TWI799594B - 用於資料處理的方法,及其設備、系統、電腦程式、非暫時性機器可讀取媒體和電腦程式產品 - Google Patents

用於資料處理的方法,及其設備、系統、電腦程式、非暫時性機器可讀取媒體和電腦程式產品 Download PDF

Info

Publication number
TWI799594B
TWI799594B TW108119291A TW108119291A TWI799594B TW I799594 B TWI799594 B TW I799594B TW 108119291 A TW108119291 A TW 108119291A TW 108119291 A TW108119291 A TW 108119291A TW I799594 B TWI799594 B TW I799594B
Authority
TW
Taiwan
Prior art keywords
computer program
data processing
readable medium
machine readable
transitory machine
Prior art date
Application number
TW108119291A
Other languages
English (en)
Other versions
TW202013233A (zh
Inventor
尼可拉斯 悟德
Original Assignee
英商Arm股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 英商Arm股份有限公司 filed Critical 英商Arm股份有限公司
Publication of TW202013233A publication Critical patent/TW202013233A/zh
Application granted granted Critical
Publication of TWI799594B publication Critical patent/TWI799594B/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
TW108119291A 2018-06-11 2019-06-04 用於資料處理的方法,及其設備、系統、電腦程式、非暫時性機器可讀取媒體和電腦程式產品 TWI799594B (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1809521.6A GB2574598B (en) 2018-06-11 2018-06-11 Attestation using device-specific and application-specific attestation messages
GB1809521.6 2018-06-11

Publications (2)

Publication Number Publication Date
TW202013233A TW202013233A (zh) 2020-04-01
TWI799594B true TWI799594B (zh) 2023-04-21

Family

ID=62975440

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108119291A TWI799594B (zh) 2018-06-11 2019-06-04 用於資料處理的方法,及其設備、系統、電腦程式、非暫時性機器可讀取媒體和電腦程式產品

Country Status (9)

Country Link
US (1) US11546165B2 (zh)
EP (1) EP3803662B1 (zh)
JP (1) JP7728083B2 (zh)
KR (1) KR102721695B1 (zh)
CN (1) CN112236770B (zh)
GB (1) GB2574598B (zh)
IL (1) IL279006B2 (zh)
TW (1) TWI799594B (zh)
WO (1) WO2019239101A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210105611A1 (en) * 2019-10-04 2021-04-08 Qualcomm Incorporated User equipment radio capability protection
CN112688907B (zh) * 2019-10-17 2023-06-30 华为技术有限公司 组合式设备远程证明模式协商方法及相关设备,存储介质
US11509480B2 (en) * 2020-06-30 2022-11-22 Vmware, Inc. Remote attestation based on runtime configuration
US20220292203A1 (en) * 2022-05-27 2022-09-15 Intel Corporation Technologies for device attestation
EP4307147A1 (de) * 2022-07-12 2024-01-17 Siemens Aktiengesellschaft Anwendungsprogramm ausgebildet eine umgebungsinformation zu erstellen
US20250094406A1 (en) * 2023-09-19 2025-03-20 The Toronto-Dominion Bank System and Method for Ingesting Data onto Cloud Computing Environments

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082984A1 (en) * 2008-09-26 2010-04-01 Microsoft Corporation Protocol-Independent Remote Attestation And Sealing
TW201635185A (zh) * 2014-06-05 2016-10-01 凱為公司 雲端式網路服務硬體安全模組之安全金鑰管理系統與方法
US20170180076A1 (en) * 2015-12-22 2017-06-22 Qualcomm Incorporated Systems and methods for communication and verification of data blocks
US20170346640A1 (en) * 2016-05-25 2017-11-30 Intel Corporation Technologies for collective authorization with hierarchical group keys
US9875368B1 (en) * 2015-06-30 2018-01-23 Google Llc Remote authorization of usage of protected data in trusted execution environments

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5982680A (ja) * 1982-10-30 1984-05-12 Toshiba Corp 画像情報記憶検索装置
JP3625658B2 (ja) 1998-09-18 2005-03-02 富士通エフ・アイ・ピー株式会社 暗号化方式および記録媒体
JP4274311B2 (ja) 2002-12-25 2009-06-03 富士通株式会社 識別情報作成方法、情報処理装置及びコンピュータプログラム
CN100550728C (zh) * 2004-06-08 2009-10-14 华为技术有限公司 2g用户接入基于ip的多媒体子系统的方法
US8924728B2 (en) * 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8438658B2 (en) * 2006-02-02 2013-05-07 International Business Machines Corporation Providing sealed storage in a data processing device
US8555072B2 (en) * 2006-08-31 2013-10-08 International Business Machines Corporation Attestation of computing platforms
US8510859B2 (en) * 2006-09-26 2013-08-13 Intel Corporation Methods and arrangements to launch trusted, co-existing environments
US7996891B2 (en) * 2008-01-30 2011-08-09 International Business Machines Corporation Systems, methods and computer program products for generating anonymous assertions
JP5363134B2 (ja) 2009-02-10 2013-12-11 Kddi株式会社 携帯無線通信端末、認証システム、携帯無線通信端末の認証方法、携帯無線通信端末の認証プログラム
JP5622668B2 (ja) * 2011-06-16 2014-11-12 株式会社エヌ・ティ・ティ・データ アプリケーション認証システム、アプリケーション認証方法
US9258117B1 (en) * 2014-06-26 2016-02-09 Amazon Technologies, Inc. Mutual authentication with symmetric secrets and signatures
GB2535165B (en) * 2015-02-09 2021-09-29 Arm Ip Ltd A method of establishing trust between a device and an apparatus
CN106161354A (zh) * 2015-03-31 2016-11-23 阿里巴巴集团控股有限公司 业务鉴权方法、装置、设备及业务服务器
JP6631210B2 (ja) 2015-12-04 2020-01-15 大日本印刷株式会社 端末装置認証用のプログラム、端末装置認証方法、サーバ装置、および、認証システム
US9705859B2 (en) * 2015-12-11 2017-07-11 Amazon Technologies, Inc. Key exchange through partially trusted third party
US20180288101A1 (en) * 2017-03-29 2018-10-04 Hewlett Packard Enterprise Development Lp Verifying that usage of virtual network function (vnf) by a plurality of compute nodes comply with allowed usage rights
US10999081B2 (en) * 2018-04-12 2021-05-04 Microsoft Technology Licensing, Llc Dynamic certificate management for a distributed authentication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082984A1 (en) * 2008-09-26 2010-04-01 Microsoft Corporation Protocol-Independent Remote Attestation And Sealing
TW201635185A (zh) * 2014-06-05 2016-10-01 凱為公司 雲端式網路服務硬體安全模組之安全金鑰管理系統與方法
US9875368B1 (en) * 2015-06-30 2018-01-23 Google Llc Remote authorization of usage of protected data in trusted execution environments
US20170180076A1 (en) * 2015-12-22 2017-06-22 Qualcomm Incorporated Systems and methods for communication and verification of data blocks
US20170346640A1 (en) * 2016-05-25 2017-11-30 Intel Corporation Technologies for collective authorization with hierarchical group keys

Also Published As

Publication number Publication date
JP7728083B2 (ja) 2025-08-22
GB201809521D0 (en) 2018-07-25
GB2574598A (en) 2019-12-18
IL279006B2 (en) 2024-03-01
JP2021527342A (ja) 2021-10-11
CN112236770A (zh) 2021-01-15
GB2574598B (en) 2021-07-28
IL279006A (en) 2021-01-31
US11546165B2 (en) 2023-01-03
KR20210016547A (ko) 2021-02-16
EP3803662A1 (en) 2021-04-14
TW202013233A (zh) 2020-04-01
WO2019239101A1 (en) 2019-12-19
EP3803662B1 (en) 2024-09-04
IL279006B1 (en) 2023-11-01
CN112236770B (zh) 2025-01-03
KR102721695B1 (ko) 2024-10-25
US20210250176A1 (en) 2021-08-12

Similar Documents

Publication Publication Date Title
EP3716090A4 (en) DATA PROCESSING PROCESS, APPARATUS AND SYSTEM
SG11202004838WA (en) Blockchain data processing method, apparatus, device, and system
TWI799594B (zh) 用於資料處理的方法,及其設備、系統、電腦程式、非暫時性機器可讀取媒體和電腦程式產品
HUE049605T2 (hu) Információ feldolgozó eljárás, berendezés, és rendszer mikroszolgáltatások megfigyelésére
EP3272117A4 (en) Image processing apparatus, image processing system, method for image processing, and computer program
EP3304945A4 (en) System, method, and apparatus for data processing and display
EP3257261A4 (en) A method, an apparatus and a computer program product for processing image sequence tracks
EP3324305A4 (en) Information processing apparatus, information processing method, and computer program
GB201612323D0 (en) Information processing apparatus, method and computer program product
SG10201900506QA (en) Information processing apparatus, information processing method, and computer program product
EP3314386A4 (en) Apparatus, information processing system, information processing method, and computer program product
EP3376399A4 (en) Data processing method, apparatus and system
EP3869340A4 (en) OPERATING AND MAINTENANCE DATA PROCESSING METHOD, SYSTEM AND DEVICE
SG11202011214XA (en) Data processing method, apparatus, device, and system, storage medium, and program product
EP3588491A4 (en) INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING PROCESS AND COMPUTER PROGRAM
EP3286002A4 (en) Information processing apparatus, information processing method, computer program product, and image forming apparatus
EP3573008A4 (en) DATA OBJECT INFORMATION PROCESSING METHOD, DEVICE AND SYSTEM
EP3578920A4 (en) INFORMATION PROCESSING DEVICE, SERVER DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING PROCESS AND PROGRAM
EP3298485A4 (en) Information processing apparatus, information processing method, and computer program
IL261819B (en) SYSTEM, METHOD, AND COMPUTER SOFTWARE PRODUCT FOR DATA PROCESSING
SG11202112580YA (en) Data processing method, apparatus, and system
EP3294557A4 (en) Apparatus, information processing method, and computer program product
EP3402292A4 (en) Information processing apparatus, communication system, information processing method, and program
EP4024281A4 (en) DATA PROCESSING METHOD AND APPARATUS, AND RELATED PRODUCT
EP3779697A4 (en) DATA PROCESSING METHOD, DEVICE AND DEVICE