Trusted environment remote verification method, device, equipment, system and medium

A remote verification and environmental technology, applied in the computer field, can solve the problems of poor versatility and achieve the effect of improving versatility

Active Publication Date: 2022-02-22
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, when the trusted environment is remotely verified between the participating platforms of the trusted computing environment, the authentication process will be affected by external factors, and the versatility is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted environment remote verification method, device, equipment, system and medium
  • Trusted environment remote verification method, device, equipment, system and medium
  • Trusted environment remote verification method, device, equipment, system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0040] Trusted Computing is a technology that can be promoted and developed by the Trusted Computing Group (Trusted Computing Cluster). Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. Based on trusted computing, calculati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a trusted environment remote verification method, device, equipment, system and medium, which relate to the technical field of blockchain and can be used for cloud computing or cloud services. The specific implementation plan is: in response to the remote verification request of the verification demander, the target enclave is verified locally through the verification program of the verification party; the local verification result is signed by the first key of the verification program, and fed back to the verification requirement party, so that the verification requester performs the following operations: verify the signed local verification result according to the second key associated with the first key, and determine the target enclave’s Remote verification results. This application provides a new trusted environment remote verification method, which improves the universality of remote verification.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to block chain technology, which can be used in cloud computing or cloud services, and in particular to a trusted environment remote verification method, device, equipment, system and medium. Background technique [0002] With the development and openness of Internet technology, data privacy has become more and more important. In order to improve the security of the private data processing process, it is usually necessary to process the private data based on trusted computing and in strict accordance with the predetermined processing logic, so that the private data itself and the calculation logic cannot be illegally read and destroyed by anyone. [0003] The current trusted computing technology is usually implemented based on Intel SGX (Intel Software Guard Extensions, Intel Software Guard Extensions) technology. In the process of using Intel SGX technology, it is usua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/60G06F21/64G06F21/71
CPCG06F21/602G06F21/64G06F21/71G06F21/14G06F21/57G06F21/445G06F21/53H04L9/0866H04L9/0894H04L9/3247G06F18/2178
Inventor 曹京奇黎相敏丁佳晨王虹妍荆博
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products