Authority principal method based on trusted computing platform
A trusted computing and trusted technology, applied in key distribution, which can solve the problems of complex deployment, high implementation cost and high network requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0025] 【Constitution of Trusted Computing Platform】
[0026] FIG. 1 shows the overall composition of a trusted computing platform according to an embodiment of the present invention. As shown in FIG. 1 , a trusted computing platform according to an embodiment of the present invention includes a software platform 100 and trusted hardware 200 . The platform user 300 accepts the services provided by the trusted hardware 200 through the software platform 100 .
[0027] In the trusted hardware 200 , the input-output module 210 is responsible for data exchange and command scheduling with the upper-layer software platform 100 . The authority delegation module 220 can provide basic authority delegation services such as "authority delegation", "delegation revocation", "delegation authentication" and "delegation policy management".
[0028] In addition...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
