O'Donoghue, 2019 - Google Patents
Towards Lightweight and Int erop erabl e Trust Models: Th Entity Attestation TokenO'Donoghue, 2019
- Document ID
- 4450561765838381998
- Author
- O'Donoghue J
- Publication year
- Publication venue
- Living in the Internet of Things (IoT 2019)
External Links
Snippet
It is generally difficult for a relying party to obtain trustworthy evidence about the characteristics of the remote systems with which they interact, and such systems as exist today tend to be proprietary and/or expensive to deploy. Large-scale IoT deployments will …
- 239000004065 semiconductor 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Anati et al. | Innovative technology for CPU based attestation and sealing | |
| Kostiainen et al. | On-board credentials with open provisioning | |
| Wei et al. | Security and privacy for storage and computation in cloud computing | |
| US9866376B2 (en) | Method, system, and device of provisioning cryptographic data to electronic devices | |
| US8266684B2 (en) | Tokenized resource access | |
| US9159046B2 (en) | Systems and methods for implementing supply chain visibility policies | |
| EP2095288B1 (en) | Method for the secure storing of program state data in an electronic device | |
| US20050283826A1 (en) | Systems and methods for performing secure communications between an authorized computing platform and a hardware component | |
| CN101114326A (en) | Systems and methods for computer device authentication | |
| US20130159704A1 (en) | System and method of enforcing a computer policy | |
| Zhao et al. | Privacy protection scheme based on remote anonymous attestation for trusted smart meters | |
| CN112311718B (en) | Method, device, equipment and storage medium for detecting hardware | |
| Zhang et al. | Trusttokenf: A generic security framework for mobile two-factor authentication using trustzone | |
| US8417640B2 (en) | Secure license key method and system | |
| Sardar et al. | SoK: Attestation in confidential computing | |
| Chen et al. | How to bind a TPM’s attestation keys with its endorsement key | |
| Cooijmans et al. | Secure key storage and secure computation in Android | |
| Akram et al. | A privacy preserving application acquisition protocol | |
| Yang et al. | A lightweight anonymous mobile shopping scheme based on DAA for trusted mobile platform | |
| O'Donoghue | Towards Lightweight and Int erop erabl e Trust Models: Th Entity Attestation Token | |
| Specification | Architecture overview | |
| Park et al. | TM-Chain: TCB measurement management using cloud blockchain for IoT devices | |
| Lenard et al. | A key to embedded system security: Locking and unlocking secrets with a trusted platform module | |
| Barker et al. | Considerations for Achieving Crypto Agility | |
| Zhang et al. | Mdaak: A flexible and efficient framework for direct anonymous attestation on mobile devices |