[go: up one dir, main page]

O'Donoghue, 2019 - Google Patents

Towards Lightweight and Int erop erabl e Trust Models: Th Entity Attestation Token

O'Donoghue, 2019

Document ID
4450561765838381998
Author
O'Donoghue J
Publication year
Publication venue
Living in the Internet of Things (IoT 2019)

External Links

Snippet

It is generally difficult for a relying party to obtain trustworthy evidence about the characteristics of the remote systems with which they interact, and such systems as exist today tend to be proprietary and/or expensive to deploy. Large-scale IoT deployments will …
Continue reading at digital-library.theiet.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Anati et al. Innovative technology for CPU based attestation and sealing
Kostiainen et al. On-board credentials with open provisioning
Wei et al. Security and privacy for storage and computation in cloud computing
US9866376B2 (en) Method, system, and device of provisioning cryptographic data to electronic devices
US8266684B2 (en) Tokenized resource access
US9159046B2 (en) Systems and methods for implementing supply chain visibility policies
EP2095288B1 (en) Method for the secure storing of program state data in an electronic device
US20050283826A1 (en) Systems and methods for performing secure communications between an authorized computing platform and a hardware component
CN101114326A (en) Systems and methods for computer device authentication
US20130159704A1 (en) System and method of enforcing a computer policy
Zhao et al. Privacy protection scheme based on remote anonymous attestation for trusted smart meters
CN112311718B (en) Method, device, equipment and storage medium for detecting hardware
Zhang et al. Trusttokenf: A generic security framework for mobile two-factor authentication using trustzone
US8417640B2 (en) Secure license key method and system
Sardar et al. SoK: Attestation in confidential computing
Chen et al. How to bind a TPM’s attestation keys with its endorsement key
Cooijmans et al. Secure key storage and secure computation in Android
Akram et al. A privacy preserving application acquisition protocol
Yang et al. A lightweight anonymous mobile shopping scheme based on DAA for trusted mobile platform
O'Donoghue Towards Lightweight and Int erop erabl e Trust Models: Th Entity Attestation Token
Specification Architecture overview
Park et al. TM-Chain: TCB measurement management using cloud blockchain for IoT devices
Lenard et al. A key to embedded system security: Locking and unlocking secrets with a trusted platform module
Barker et al. Considerations for Achieving Crypto Agility
Zhang et al. Mdaak: A flexible and efficient framework for direct anonymous attestation on mobile devices