Methods and systems are provided herein that allow for a first device to remotely authenticate a particular software or hardware feature of a second device with which the first device is communicating. More specifically, the teachings herein allow for a server to verify that a particular application running on a client machine is an authentic application, as opposed to an application developed by a rogue element disguising itself as a authentic application. In a broader sense the teachings herein allow a server to initiate a sequence of instructions on the remote machine, and for which assurance is needed that the intended instructions were executed on the remote machine. Additionally methods and systems are provided that generate and update client registration certificates that are tightly bound to both client and server.
展开▼