Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted device and computing system

A trusted computing and trusted technology, applied in computing, transmission systems, digital transmission systems, etc., can solve problems such as inapplicable cloud computing or equipment sharing

Pending Publication Date: 2022-01-21
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, these techniques are not suitable for cloud computing or any other use case where devices are shared between tenants or not owned by users, because the above scenarios assume that the owner, user and administrator are the same entity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted device and computing system
  • Trusted device and computing system
  • Trusted device and computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] figure 1 A schematic diagram of the trusted device 100 provided by the embodiment of the present invention is shown. Trusted device 100 may be used in trusted computing system 400, as referenced below Figure 4 describe. Trusted device 100 and trusted computing system 400 are particularly well suited for cloud computing.

[0081] Trusted device 100 is used to obtain numerical value 101 and program code 102 from user equipment 501 (user equipment 501 will also be referred to below Figure 5 describe). User device 501 is not part of trusted device 100 . According to the numerical value 101 and the program code 102 , the trusted device 100 can calculate a hash value 103 and sign the hash value 103 . Then, the signature hash value 103 is provided to the verification device 401 (also described below).

[0082] Therefore, it can be verified that the program code 102 provided to the trusted device 100 is also the program code 102 executed by the trusted device.

[0083]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the fields of trusted computing and cloud computing. The present invention provides a trusted device for a trusted computing system. The trusted device is configured to obtain a numerical value and program code from a user device; calculate a hash value based on the numerical value and based on the program code; sign the hash value; and provide the signed hash value to a verification device.

Description

technical field [0001] The present invention relates to the field of trusted computing. More specifically, the present invention relates to a trusted device and a trusted computing system including the trusted device. Specifically, the present invention can be used in the field of cloud computing. Background technique [0002] Cloud computing involves multiple tenants using shared resources. This reduces costs and reduces maintenance. Because of this sharing model, the cloud provider typically has complete control over the user's data and resources (such as virtual machines, storage, or networking). This includes: accessing privileged data (e.g., private keys, passwords), secure information stored in the cloud; being able to act on behalf of the user; misleading the user about the resources available in the cloud. This can also be done if an attacker compromises the cloud infrastructure. [0003] For these reasons, trust is required between cloud providers and tenants. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/57H04L9/32H04L9/40H04L9/08
CPCG06F21/575G06F21/57G06F21/44H04L63/123H04L9/3247H04L9/0897
Inventor 萨吉·米斯拉伊迪玛·库兹涅佐夫
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products