首页>
外国专利>
Attestation-based scheme for validating peering setups for critical infrastructure protocols
Attestation-based scheme for validating peering setups for critical infrastructure protocols
展开▼
机译:基于证明的方案,用于验证关键基础架构协议的窥视设置
展开▼
页面导航
摘要
著录项
相似文献
摘要
A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.
展开▼