Nothing Special   »   [go: up one dir, main page]

CA2632590A1 - Method to verify the integrity of components on a trusted platform using integrity database services - Google Patents

Method to verify the integrity of components on a trusted platform using integrity database services Download PDF

Info

Publication number
CA2632590A1
CA2632590A1 CA002632590A CA2632590A CA2632590A1 CA 2632590 A1 CA2632590 A1 CA 2632590A1 CA 002632590 A CA002632590 A CA 002632590A CA 2632590 A CA2632590 A CA 2632590A CA 2632590 A1 CA2632590 A1 CA 2632590A1
Authority
CA
Canada
Prior art keywords
integrity
report
client platform
trust
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002632590A
Other languages
English (en)
French (fr)
Inventor
Thomas Parasu Hardjono
David Maurits Bleckmann
William Wyatt Starnes
Bradley Douglas Andersen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2632590A1 publication Critical patent/CA2632590A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
CA002632590A 2005-12-09 2006-12-08 Method to verify the integrity of components on a trusted platform using integrity database services Abandoned CA2632590A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US74936805P 2005-12-09 2005-12-09
US60/749,368 2005-12-09
US75974206P 2006-01-17 2006-01-17
US60/759,742 2006-01-17
PCT/US2006/061811 WO2008024135A2 (en) 2005-12-09 2006-12-08 Method to verify the integrity of components on a trusted platform using integrity database services

Publications (1)

Publication Number Publication Date
CA2632590A1 true CA2632590A1 (en) 2008-02-28

Family

ID=39107257

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002632590A Abandoned CA2632590A1 (en) 2005-12-09 2006-12-08 Method to verify the integrity of components on a trusted platform using integrity database services

Country Status (3)

Country Link
JP (1) JP2009518762A (ja)
CA (1) CA2632590A1 (ja)
WO (1) WO2008024135A2 (ja)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8327131B1 (en) 2004-11-29 2012-12-04 Harris Corporation Method and system to issue trust score certificates for networked devices using a trust scoring service
US8266676B2 (en) 2004-11-29 2012-09-11 Harris Corporation Method to verify the integrity of components on a trusted platform using integrity database services
US9450966B2 (en) 2004-11-29 2016-09-20 Kip Sign P1 Lp Method and apparatus for lifecycle integrity verification of virtual machines
US7487358B2 (en) 2004-11-29 2009-02-03 Signacert, Inc. Method to control access between network endpoints based on trust scores calculated from information system component analysis
US7733804B2 (en) 2004-11-29 2010-06-08 Signacert, Inc. Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain
US20110179477A1 (en) * 2005-12-09 2011-07-21 Harris Corporation System including property-based weighted trust score application tokens for access control and related methods
EP2110766A1 (en) * 2008-04-16 2009-10-21 Robert Bosch Gmbh Electronic control unit, software and/or hardware component and method to reject wrong software and/or hardware components with respect to the electronic control unit
CN101729289B (zh) * 2008-11-03 2012-04-04 华为技术有限公司 平台完整性认证方法及系统、无线接入设备和网络设备
US8595491B2 (en) * 2008-11-14 2013-11-26 Microsoft Corporation Combining a mobile device and computer to create a secure personalized environment
NZ592063A (en) * 2008-12-24 2014-02-28 Commw Of Australia Digital video guard
TWI580285B (zh) * 2009-03-05 2017-04-21 內數位專利控股公司 H(e)NB完整性驗證及認證方法及裝置
CN101588244A (zh) * 2009-05-08 2009-11-25 中兴通讯股份有限公司 对网络设备进行鉴权的方法及系统
CN101572704B (zh) 2009-06-08 2012-05-23 西安西电捷通无线网络通信股份有限公司 一种适合三元对等鉴别可信网络连接架构的访问控制方法
US9531695B2 (en) 2009-06-12 2016-12-27 Microsoft Technology Licensing, Llc Access control to secured application features using client trust levels
IT1398578B1 (it) * 2010-03-05 2013-03-01 Elsag Datamat Spa Dispositivo elettronico portatile interfacciabile ad un calcolatore
CN101909058B (zh) * 2010-07-30 2013-01-16 天维讯达无线电设备检测(北京)有限责任公司 一种适合可信连接架构的平台鉴别策略管理方法及系统
US9208318B2 (en) * 2010-08-20 2015-12-08 Fujitsu Limited Method and system for device integrity authentication
US9111079B2 (en) * 2010-09-30 2015-08-18 Microsoft Technology Licensing, Llc Trustworthy device claims as a service
US9032494B2 (en) * 2011-11-10 2015-05-12 Sony Corporation Network-based revocation, compliance and keying of copy protection systems
FR2989197B1 (fr) * 2012-04-05 2014-05-02 Toucan System Procede de securisation d'acces a un dispositif informatique
US9407638B2 (en) * 2013-08-26 2016-08-02 The Boeing Company System and method for trusted mobile communications
US9973481B1 (en) * 2015-06-16 2018-05-15 Amazon Technologies, Inc. Envelope-based encryption method
US10033703B1 (en) 2015-06-16 2018-07-24 Amazon Technologies, Inc. Pluggable cipher suite negotiation
CN109714185B (zh) 2017-10-26 2022-03-04 阿里巴巴集团控股有限公司 可信服务器的策略部署方法、装置、系统及计算系统
JP6794383B2 (ja) 2018-01-15 2020-12-02 株式会社東芝 電子装置、方法、プログラム及びサーバ、方法、プログラム

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132122A1 (en) * 2003-12-16 2005-06-16 Rozas Carlos V. Method, apparatus and system for monitoring system integrity in a trusted computing environment
JP2006139747A (ja) * 2004-08-30 2006-06-01 Kddi Corp 通信システムおよび安全性保証装置
US7733804B2 (en) * 2004-11-29 2010-06-08 Signacert, Inc. Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain

Also Published As

Publication number Publication date
WO2008024135A2 (en) 2008-02-28
WO2008024135A3 (en) 2008-12-04
JP2009518762A (ja) 2009-05-07

Similar Documents

Publication Publication Date Title
CA2632590A1 (en) Method to verify the integrity of components on a trusted platform using integrity database services
CN110677252B (zh) Rcs联合区块链身份模型和安全个人可识别信息数据传输模型
CN108777684B (zh) 身份认证方法、系统及计算机可读存储介质
CN102271042B (zh) 数字证书认证方法、系统、USB Key设备和服务器
US10867058B2 (en) Method and system for protecting secure computer systems from insider threats
US9887983B2 (en) Apparatus and method for implementing composite authenticators
US8839395B2 (en) Single sign-on between applications
US8438385B2 (en) Method and apparatus for identity verification
US8533482B2 (en) Method for generating a key pair and transmitting a public key or request file of a certificate in security
CN111224788B (zh) 一种基于区块链的电子合同管理方法、装置及系统
US8631486B1 (en) Adaptive identity classification
US20140019766A1 (en) Signature Generation and Verification System and Signature Verification Apparatus
US10972262B2 (en) Persona and device based certificate management
CN106789059B (zh) 一种基于可信计算的远程双向访问控制系统及方法
CN110677376A (zh) 认证方法、相关设备和系统及计算机可读存储介质
CN114444134A (zh) 一种数据使用授权方法、系统及装置
Abraham et al. SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance.
US20190052632A1 (en) Authentication system, method and non-transitory computer-readable storage medium
CN105721489A (zh) 基于数字证书对ip白名单中的ip认证方法与系统
KR20140043071A (ko) 접속 시도 기기 인증 시스템 및 방법
Klenk et al. Preventing identity theft with electronic identity cards and the trusted platform module
Kim et al. Patch integrity verification method using dual electronic signatures
CN113872986A (zh) 配电终端认证方法、系统、装置、计算机设备和存储介质
TW201638826A (zh) 在行動裝置上以安全信物使相異程式獲得數位憑證簽署之系統及方法
CN104580161A (zh) 一种基于安全标识文件的软件实名认证方法和装置

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued

Effective date: 20150213