发明授权
US09521125B2 Pseudonymous remote attestation utilizing a chain-of-trust 有权
使用信任链的伪匿名远程认证

Pseudonymous remote attestation utilizing a chain-of-trust
摘要:
The present application is directed to pseudonymous attestation utilizing a chain of trust. An example prover device may include a chain-of-trust based on keys derived cryptographically from a shared symmetric key and pseudonymous identification data. The chain-of-trust may be used to cryptographically generate a pseudonymous public key and private key. The prover device may provide at least pseudonymous identification data and the pseudonymous public key to a verifier device. The verifier device may access pseudonymous data published by a certifier determine whether the prover device is authentic and includes known-good versions of software (e.g., sourced from the certifier). In this manner, the verifier device may be assured that the prover device is authentic without knowing the actual identity of the prover device. In at least one embodiment, the prover device may also include a trusted execution environment (TEE).
信息查询
0/0