首页> 外国专利> Attestation-based scheme for validating peering setups for critical infrastructure protocols

Attestation-based scheme for validating peering setups for critical infrastructure protocols

机译:基于证明的方案,用于验证关键基础架构协议的窥视设置

摘要

A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.
机译:验证器对等系统将请求发送到另一个对等系统的应用以获得应用程序的完整性数据。 响应于该请求,验证者对等系统获得包括其他对等系统的内核安全引导度量的响应和应用程序的完整性数据以及任何应用程序依赖性。 如果验证器对等系统确定响应有效,则验证者对等系统对一组已知良好值评估完整性数据和内核安全引导度量,以确定完整性数据和内核安全引导度量是否有效。 如果完整性数据和内核安全引导指标有效,则验证者对等系统确定其他对等系统是值得信赖的。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号