Device attestation via secure hardened management agent
A technology for computing equipment and equipment management, which is applied in the direction of safety communication devices, computer safety devices, electrical digital data processing, etc., and can solve problems such as difficulties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0009] This article discusses device attestation through a security-hardened management agent. When the computing device boots, the computing device boots in a secure manner that allows metrics that reflect which components or modules were loaded and executed during boot (e.g., metrics that identify which components or modules were loaded and executed or based on which generated metrics) are generated. Metrics of the security posture of these components or modules, as well as device management agents and computing devices, are also obtained by the metrics system. A device management agent accesses an attestation service for a collection of devices or other resources managed by the management service, referred to herein as an enterprise. The device management agent provides metrics from the metrics system to an attestation service that evaluates the metrics and determines whether the computing device is authenticated for use in the enterprise based on the evaluation. An indic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


