Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Remote proving method in trusted computation environment

A remote certification and trusted computing technology, applied in computing, computer security devices, internal/peripheral computer component protection, etc., can solve the lack of replay attack, counterfeit attack man-in-the-middle attack prevention capabilities, lack of consistency and reliability in measurement and proof Issues such as scalability, inability to guarantee the authenticity of the integrity measurement value, platform privacy, etc., to achieve the effect of preventing attacks

Inactive Publication Date: 2009-07-08
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 69 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing remote attestation schemes are issued by the verification requester. The measurement and proof lack consistency and scalability, cannot guarantee the authenticity of the integrity measurement value and the privacy of the platform, and lack protection against replay attacks and impersonation attacks. and man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote proving method in trusted computation environment
  • Remote proving method in trusted computation environment
  • Remote proving method in trusted computation environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0038] The present invention is a method for remote certification in a trusted computing environment. It uses a security chip TPM / TCM to generate a session encryption key by using the unanticipated time stamp generated by the verified trusted platform and the verification requester. The integrity measurement value and measurement log of the trusted platform are encrypted, and the identity, unpredictable time stamp, and encryption result are digitally signed to ensure the authenticity of the integrity measurement value and measurement log of the verified trusted platform and the privacy of the platform Through the measurement log, the verification requester reconstructs the integrity measurement process of the verified trusted platform, calculates and compares the integrity measurement value, and realizes the remote proof of the verified trusted platform.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for remote attestation in a trusted computing environment. The method is characterized in that secure session key is adopted for encrypting the metric value and the metric log of trusted platform to be verified, and signs for encryption result data. The method is based on a security chip TPM / TCM; the adopted remote attestation framework comprises three parts: an integrity measuring mechanism, a reporting mechanism and a validation mechanism, which are achieved by an integrity measuring agency, a report agency and a verification requestor, wherein, the measuring agency, the report agency and the verification requestor are installed in the trusted platform to be verified. The method ensures that the authenticity of the integrity measuring value and the measuring log and the privacy of the platform are kept; the replay attack, impersonation attack and man-in-the-middle attack are effectively prevented; the method is used for proving to the verification requestor that the running environment of the platform is credible, or used for self-test of the platform running environment; the method can be used for not only proving to the requestor that the platform running environment is credible, but also the self-test of the platform running environment; and the method is more suitable for a fair and open network environment.

Description

technical field [0001] The invention relates to a remote attestation method in a trusted computing environment, which belongs to the field of computer information security trusted computing. Background technique [0002] Distributed applications have higher and higher security requirements for computing platforms in an open system environment. Distributed applications include many interests and security conflicting parties. Therefore, establishing mutual trust between platforms and proving that the computing environment is credible has become the current information A major imperative for security. On the other hand, computing platforms running malicious program codes exhibit arbitrary attack behaviors, such as Byzantine attacks, which make it impossible to maintain long-term static trust between platforms. At present, the general idea is to use remote attestation to identify the software configuration and status of remote platforms, so as to calculate the environment statu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L29/06G06F21/71
Inventor 李清玉
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products