Trusted environment remote verification method, device, equipment, system and medium

A remote verification and environmental technology, applied in the computer field, can solve the problems of poor versatility and achieve the effect of improving versatility

Active Publication Date: 2021-01-15
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, when the trusted environment is remotely verified between the participating platforms of the trusted computing environment, the authentication process will be affected by external factors, and the versatility is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted environment remote verification method, device, equipment, system and medium
  • Trusted environment remote verification method, device, equipment, system and medium
  • Trusted environment remote verification method, device, equipment, system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0040] Trusted Computing is a technology that can be promoted and developed by the Trusted Computing Group (Trusted Computing Cluster). Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. Based on trusted computing, calculati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted environment remote verification method, device, equipment, system and medium, relates to the technical field of block chains, and can be used for cloud computing or cloud service. The method comprises steps: in response to a remote verification request of a verification demander, performing local verification on a target enclave through a verification program of averification party; signing a local verification result through a first secret key of a verification program, and feeding back to the verification demander, so that the verification demander executesthe following operations: verifying the signed local verification result according to a second secret key associated with the first secret key, and determining a remote verification result of the target enclave according to a signature verification result. The invention provides a novel trusted environment remote verification method, and the universality of remote verification is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to block chain technology, which can be used in cloud computing or cloud services, and in particular to a trusted environment remote verification method, device, equipment, system and medium. Background technique [0002] With the development and openness of Internet technology, data privacy has become more and more important. In order to improve the security of the private data processing process, it is usually necessary to process the private data based on trusted computing and in strict accordance with the predetermined processing logic, so that the private data itself and the calculation logic cannot be illegally read and destroyed by anyone. [0003] The current trusted computing technology is usually implemented based on Intel SGX (Intel Software Guard Extensions, Intel Software Guard Extensions) technology. In the process of using Intel SGX technology, it is usua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F21/60G06F21/64G06F21/71
CPCG06F21/602G06F21/64G06F21/71G06F21/14G06F21/57G06F21/445G06F21/53H04L9/0866H04L9/0894H04L9/3247G06F18/2178
Inventor 曹京奇黎相敏丁佳晨王虹妍荆博
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products