Trusted remote certification method, device and system
A remote certification and trusted technology, applied in the field of Internet technology applications, can solve problems such as server terminal operation affecting information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] This application provides such as figure 1 The trusted remote attestation system shown. figure 1 It is a schematic structural diagram of the trusted remote certification system according to the first embodiment of the present application. The trusted remote attestation system provided by this application includes:
[0057] The first service trusted server 11, the second service trusted server 12 and the trusted remote certification server 13, wherein the second service trusted server 12 is used to receive the challenge request sent by the first service trusted server 11, and obtain the The information to be verified of the first business trusted server 11 in the challenge request; send a verification request to the trusted remote certification server 13, wherein the verification request includes: the pending verification information of the first business server 11, obtain the trusted remote certification server 13 and return The trusted remote certification server 13 ...
Embodiment 2
[0148] According to an embodiment of the present application, an embodiment of a trusted remote attestation method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.
[0149] The method embodiment provided in the first embodiment of the present application may be executed in a mobile terminal, a server terminal, or a similar computing device. Take running on the server terminal as an example, Image 6 It is a hardware structural block diagram of a server terminal of a trusted remote attestation method according to an embodiment of the present application. like Image 6 As shown, the server terminal 60 may include one or more (only one is shown in the figure) processor 602 (the process...
Embodiment 3
[0198] This application provides such as Figure 8 The trusted remote attestation method shown. On the trusted remote attestation server side, Figure 8 This is a flow chart of the trusted remote attestation method according to the third embodiment of the present application.
[0199] Step S802, receiving a verification request sent by the second service trusted server, wherein the verification request includes: information to be verified of the first service server, and the second service trusted server interacts with the first service trusted server;
[0200] Step S804, returning a corresponding verification response to the second service trusted server according to the verification request.
[0201] Specifically, the trusted remote attestation method provided by the present application is on the trusted remote attestation server side, corresponding to the trusted remote attestation server 33 in Embodiment 1, combined with steps S802 to S804, in the process of trusted remo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com