Therefore, the program attestation of remote attestation is based on trust, not behavior.
所以说远程认证对程序的认证是基于信任的,而不是基于行为的。
On this basis, a detailed analysis for the existing remote attestation scheme is carried out.
在此基础上,对现有的远程认证方案进行了详细的分析。
Remote attestation technology provides us a instrumentality to attest the running environment and the configuration of a remote platform.
远程认证技术提供了一种对终端平台运行环境、配置进行可信评估的手段。
Remote attestation is one ofthe important functionalities oftmsted computing. Binary attestation and property-based attestation are two methods of authentication.
远程认证是可信计算平台的一种重要功能,二进制方法和基于属性证书的认证是其两种认证方法。
This attestation method is dynamic and not attests only once, it can be a complement of remote attestation so as to overcome the shortcomings of remote attestation.
这种认证是动态的、非一次性的,可以作为远程认证的一个补充,以弥补远程认证不基于行为、静态、一次性的缺点。
This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.
最后讨论了安全操作系统的边界扩展问题,利用可信计算,结合远程证明,封装存储等相关技术,扩展了安全操作系统的控制范围。
Remote attestation which the users are used to identify themselves to connect remote communication is required in the trusted computing. As well as the users require to protect their privacy.
同时,在可信计算技术中,终端计算机是通过用户身份认证来实现安全的远程访问,用户在实现远程认证的同时也要求保护自己的隐私不被泄漏。
At last, we proposed a new Remote Anonymous Attestation Scheme Based on Ring Signature.
最后,设计并实现了一种新的基于环签名的远程匿名认证方案。
At last, we proposed a new Remote Anonymous Attestation Scheme Based on Ring Signature.
最后,设计并实现了一种新的基于环签名的远程匿名认证方案。
应用推荐